Analysis
-
max time kernel
38s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe
Resource
win10v2004-20220901-en
General
-
Target
d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe
-
Size
119KB
-
MD5
913870c3ad4298468247574e42c5d190
-
SHA1
d7f393376069461f13ce5d4c02b5a5b20b706c47
-
SHA256
d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c
-
SHA512
b5549006018d36ce41cc671e721a749027559d1bfb1cc7e93e1bd7ea049d77e65a89ababf0a3df0f388c72d1f35dffa80922e6a685a1b31c7c902d272b59c210
-
SSDEEP
3072:ZQkTCXWsZCR7c1Q+NWF2Yqz1Qes37NJbZzLztCv/Pv:ZH0WsVJKqJAZj34v/P
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1504-58-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral1/memory/1504-60-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\03163CDC = "C:\\Windows\\03163CDC\\svchsot.exe" d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\03163CDC\svchsot.exe d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe File opened for modification C:\Windows\03163CDC\svchsot.exe d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1504 d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe 1504 d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe 1504 d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe 1504 d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1504 d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe Token: SeDebugPrivilege 1504 d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1504 wrote to memory of 112 1504 d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe 26 PID 1504 wrote to memory of 112 1504 d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe 26 PID 1504 wrote to memory of 112 1504 d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe 26 PID 1504 wrote to memory of 112 1504 d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe 26 PID 112 wrote to memory of 1940 112 net.exe 28 PID 112 wrote to memory of 1940 112 net.exe 28 PID 112 wrote to memory of 1940 112 net.exe 28 PID 112 wrote to memory of 1940 112 net.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe"C:\Users\Admin\AppData\Local\Temp\d1978f87d1ac3f2604ecf21356d89df7e2ea1ccfb8184859d95e3879ecf8076c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:1940
-
-