Analysis
-
max time kernel
151s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 19:25
Static task
static1
Behavioral task
behavioral1
Sample
50d98ce6aec2b53231977b214256a34d75248bddef72b5ef207ea2a98b7a7014.exe
Resource
win7-20220812-en
General
-
Target
50d98ce6aec2b53231977b214256a34d75248bddef72b5ef207ea2a98b7a7014.exe
-
Size
210KB
-
MD5
6a0414e3f0e373693d1ef06e1dacce20
-
SHA1
a25f29a244b2dc606d9e4f68598ec517bd503887
-
SHA256
50d98ce6aec2b53231977b214256a34d75248bddef72b5ef207ea2a98b7a7014
-
SHA512
817a0c69ebeba4100acb87fb57edd59a5f2b3d6aac8db5299cc1c302becd891d0085329aa2da7d571e8f8fcdcd3c3a553379d6b56ce342e3119576e2e393045a
-
SSDEEP
3072:PmZBWwd86YpyFnpdp/xVRXEgoY8fv/fNbJzZ7EBMX8WryJ:PTnpyNpH/xVyfY8fv/fX97EYG
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/960-55-0x0000000010000000-0x000000001002F000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1436 vcflye.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\vcflye.exe 50d98ce6aec2b53231977b214256a34d75248bddef72b5ef207ea2a98b7a7014.exe File opened for modification C:\Windows\vcflye.exe 50d98ce6aec2b53231977b214256a34d75248bddef72b5ef207ea2a98b7a7014.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1436 vcflye.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 960 50d98ce6aec2b53231977b214256a34d75248bddef72b5ef207ea2a98b7a7014.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50d98ce6aec2b53231977b214256a34d75248bddef72b5ef207ea2a98b7a7014.exe"C:\Users\Admin\AppData\Local\Temp\50d98ce6aec2b53231977b214256a34d75248bddef72b5ef207ea2a98b7a7014.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:960
-
C:\Windows\vcflye.exeC:\Windows\vcflye.exe1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1436
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD56a0414e3f0e373693d1ef06e1dacce20
SHA1a25f29a244b2dc606d9e4f68598ec517bd503887
SHA25650d98ce6aec2b53231977b214256a34d75248bddef72b5ef207ea2a98b7a7014
SHA512817a0c69ebeba4100acb87fb57edd59a5f2b3d6aac8db5299cc1c302becd891d0085329aa2da7d571e8f8fcdcd3c3a553379d6b56ce342e3119576e2e393045a
-
Filesize
210KB
MD56a0414e3f0e373693d1ef06e1dacce20
SHA1a25f29a244b2dc606d9e4f68598ec517bd503887
SHA25650d98ce6aec2b53231977b214256a34d75248bddef72b5ef207ea2a98b7a7014
SHA512817a0c69ebeba4100acb87fb57edd59a5f2b3d6aac8db5299cc1c302becd891d0085329aa2da7d571e8f8fcdcd3c3a553379d6b56ce342e3119576e2e393045a