Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 16:43
Behavioral task
behavioral1
Sample
0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe
Resource
win7-20220812-en
General
-
Target
0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe
-
Size
111KB
-
MD5
8191ec99515c8b36c870b53402d0bc00
-
SHA1
ce2097429ca76ae86e73b9097db5d24a0a9b0847
-
SHA256
0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4
-
SHA512
4c5fefcce0627d59c982f1f8c62acb7f486d88d1c36d24b76ddd57dcf0d778b0100289f2ab08af850909fb0033dcc4764c44a1bc125740d72a78f9b2eb6b52aa
-
SSDEEP
3072:KQYPX1Sp7+tFDZzxqE/34pEX9ybZuwB+ky:SEoFDB3E8UZuwB+l
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/memory/2248-132-0x0000000000400000-0x000000000043BDB2-memory.dmp family_gh0strat behavioral2/files/0x001b00000001d9f9-133.dat family_gh0strat behavioral2/files/0x000a000000022e10-135.dat family_gh0strat behavioral2/files/0x001b00000001d9f9-137.dat family_gh0strat behavioral2/files/0x000a000000022e10-134.dat family_gh0strat -
Loads dropped DLL 2 IoCs
pid Process 2248 0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe 316 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe 316 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 2248 0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe Token: SeRestorePrivilege 2248 0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe Token: SeBackupPrivilege 2248 0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe Token: SeRestorePrivilege 2248 0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe Token: SeBackupPrivilege 2248 0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe Token: SeRestorePrivilege 2248 0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe Token: SeBackupPrivilege 2248 0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe Token: SeRestorePrivilege 2248 0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe"C:\Users\Admin\AppData\Local\Temp\0ec02a267bd92bab5041e851af7eb284b6b3e8ddfbc6d971f96195637ca215c4.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:316
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD595c8040b29a2630db081815183a57287
SHA1bc7b99ca2c844d46875a52daeea11e60c2035de8
SHA256d0233721b65927539fd143195389d2392c204311217ca9291c56ec4cf4e64a70
SHA5121d688fb4f0554411960d467003fff8ad8681c7717412f8a8982eae4822c399228a856968841cb091cb98ee136cbb5db65fe3a1c66974695e6882bcdb199715a4
-
Filesize
105KB
MD595c8040b29a2630db081815183a57287
SHA1bc7b99ca2c844d46875a52daeea11e60c2035de8
SHA256d0233721b65927539fd143195389d2392c204311217ca9291c56ec4cf4e64a70
SHA5121d688fb4f0554411960d467003fff8ad8681c7717412f8a8982eae4822c399228a856968841cb091cb98ee136cbb5db65fe3a1c66974695e6882bcdb199715a4
-
Filesize
222KB
MD537d47f14edc44bf7b5370c37f6ba4fed
SHA1619c256f8b5b20dfc5c13b682b33848dff265626
SHA2567e2f669064e19616ad90eeaa17ebed5bf3a0de1aadcb2711b8e4b790ced90aa0
SHA5126de46fb5311bf65d4a5a67d07ddab953997de76b6c90dd6bf943db5bc1cf395cac470fe70c243787653361b4af91cbd977a71dae4c6233d00f8648b295e5d659
-
Filesize
117B
MD59c59118195177379e9f63e26c95c56bd
SHA11cd4f4a692350f280fe9310fa4892ad280e08bff
SHA2567661b454519bf64d0941984d1d84dbe0f768471d0bd98b7e8b522a496776ada6
SHA512b3ebd0a526329197c57759adc3728682b1028441c1a0010091dc31a53e68d7a8db00ef00d668dddd523e21c4ca183a42f52b61f0aace4d3e9c084551e929191a
-
Filesize
222KB
MD537d47f14edc44bf7b5370c37f6ba4fed
SHA1619c256f8b5b20dfc5c13b682b33848dff265626
SHA2567e2f669064e19616ad90eeaa17ebed5bf3a0de1aadcb2711b8e4b790ced90aa0
SHA5126de46fb5311bf65d4a5a67d07ddab953997de76b6c90dd6bf943db5bc1cf395cac470fe70c243787653361b4af91cbd977a71dae4c6233d00f8648b295e5d659