Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 16:44
Behavioral task
behavioral1
Sample
0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe
Resource
win10v2004-20220812-en
General
-
Target
0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe
-
Size
122KB
-
MD5
8132bb9b930dd9deed6e510efa205458
-
SHA1
8bb4e940c1b58a70889ac5f80114118780586e28
-
SHA256
0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3
-
SHA512
08bfccea0f4b3cc75871501ce6b33f6f60cc271522382a661d8ed9e0eb2e7f1cdef77679e1e9795d878a6a683b18f4d68ea2996be1e163ac786e4a8c86b2fc5e
-
SSDEEP
3072:IenQFr01f3CbhZxIdlBGYuixszSPvi+wXNdG3Wh:IenQFr0Z3QhnIDlu24SP6+wXNC4
Malware Config
Signatures
-
Gh0st RAT payload 20 IoCs
resource yara_rule behavioral1/memory/1652-55-0x0000000000400000-0x0000000000420000-memory.dmp family_gh0strat behavioral1/files/0x000c0000000054a8-56.dat family_gh0strat behavioral1/files/0x000c0000000054a8-57.dat family_gh0strat behavioral1/files/0x000c0000000054a8-64.dat family_gh0strat behavioral1/files/0x000c0000000054a8-63.dat family_gh0strat behavioral1/files/0x000c0000000054a8-62.dat family_gh0strat behavioral1/files/0x000c0000000054a8-61.dat family_gh0strat behavioral1/memory/1444-65-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat behavioral1/memory/1492-66-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat behavioral1/memory/1492-67-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat behavioral1/memory/1492-68-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat behavioral1/files/0x000c0000000054a8-70.dat family_gh0strat behavioral1/files/0x000c0000000054a8-74.dat family_gh0strat behavioral1/files/0x000c0000000054a8-77.dat family_gh0strat behavioral1/files/0x000c0000000054a8-76.dat family_gh0strat behavioral1/files/0x000c0000000054a8-75.dat family_gh0strat behavioral1/memory/1516-78-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat behavioral1/memory/844-79-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat behavioral1/memory/1652-80-0x0000000000400000-0x0000000000420000-memory.dmp family_gh0strat behavioral1/memory/1492-81-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat -
Blocklisted process makes network request 2 IoCs
flow pid Process 1 1492 rundll32.exe 7 844 rundll32.exe -
Sets DLL path for service in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\NetMan1\Parameters\ServiceDll = "C:\\Windows\\SysTem32\\newarea.dll" 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\NetMan2\Parameters\ServiceDll = "C:\\Windows\\SysTem32\\newarea.dll" 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe -
Loads dropped DLL 10 IoCs
pid Process 1444 SVCHOST.EXE 1492 rundll32.exe 1492 rundll32.exe 1492 rundll32.exe 1492 rundll32.exe 1516 SVCHOST.EXE 844 rundll32.exe 844 rundll32.exe 844 rundll32.exe 844 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\newarea.dll 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe -
Kills process with taskkill 2 IoCs
pid Process 1756 taskkill.exe 1340 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1652 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1340 taskkill.exe Token: SeDebugPrivilege 1444 SVCHOST.EXE Token: SeDebugPrivilege 1756 taskkill.exe Token: SeDebugPrivilege 1516 SVCHOST.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1340 1652 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe 28 PID 1652 wrote to memory of 1340 1652 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe 28 PID 1652 wrote to memory of 1340 1652 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe 28 PID 1652 wrote to memory of 1340 1652 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe 28 PID 1444 wrote to memory of 1492 1444 SVCHOST.EXE 32 PID 1444 wrote to memory of 1492 1444 SVCHOST.EXE 32 PID 1444 wrote to memory of 1492 1444 SVCHOST.EXE 32 PID 1444 wrote to memory of 1492 1444 SVCHOST.EXE 32 PID 1444 wrote to memory of 1492 1444 SVCHOST.EXE 32 PID 1444 wrote to memory of 1492 1444 SVCHOST.EXE 32 PID 1444 wrote to memory of 1492 1444 SVCHOST.EXE 32 PID 1652 wrote to memory of 1756 1652 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe 33 PID 1652 wrote to memory of 1756 1652 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe 33 PID 1652 wrote to memory of 1756 1652 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe 33 PID 1652 wrote to memory of 1756 1652 0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe 33 PID 1516 wrote to memory of 844 1516 SVCHOST.EXE 36 PID 1516 wrote to memory of 844 1516 SVCHOST.EXE 36 PID 1516 wrote to memory of 844 1516 SVCHOST.EXE 36 PID 1516 wrote to memory of 844 1516 SVCHOST.EXE 36 PID 1516 wrote to memory of 844 1516 SVCHOST.EXE 36 PID 1516 wrote to memory of 844 1516 SVCHOST.EXE 36 PID 1516 wrote to memory of 844 1516 SVCHOST.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe"C:\Users\Admin\AppData\Local\Temp\0da2e349eb77cc5d30e2b68ab3afd0aa6a1bc39940aa0bbab9b9864e26fbc6b3.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im RSTray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im RSTray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\SysWOW64\SVCHOST.EXEC:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\newarea.dll,main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1492
-
-
C:\Windows\SysWOW64\SVCHOST.EXEC:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\newarea.dll,main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:844
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5c631b6819bbd3bf5baf1f083e7fa7a0a
SHA164c28952fb16ee998e435f8482d77f0e2b4a4996
SHA256a8ee29af1086b1cc0d24364d404337dc920a18619bf6e9e5db2ad9eb5233cba6
SHA512654386b2f9d82acdf1c10d1571175df3a5e941c6f224373d412c5732f24f14955bcbb35881d9ffc8d1cc9c315bd34ae8134160ddd684ba1abbec3e776191e3c2
-
Filesize
102KB
MD5c631b6819bbd3bf5baf1f083e7fa7a0a
SHA164c28952fb16ee998e435f8482d77f0e2b4a4996
SHA256a8ee29af1086b1cc0d24364d404337dc920a18619bf6e9e5db2ad9eb5233cba6
SHA512654386b2f9d82acdf1c10d1571175df3a5e941c6f224373d412c5732f24f14955bcbb35881d9ffc8d1cc9c315bd34ae8134160ddd684ba1abbec3e776191e3c2
-
Filesize
102KB
MD5c631b6819bbd3bf5baf1f083e7fa7a0a
SHA164c28952fb16ee998e435f8482d77f0e2b4a4996
SHA256a8ee29af1086b1cc0d24364d404337dc920a18619bf6e9e5db2ad9eb5233cba6
SHA512654386b2f9d82acdf1c10d1571175df3a5e941c6f224373d412c5732f24f14955bcbb35881d9ffc8d1cc9c315bd34ae8134160ddd684ba1abbec3e776191e3c2
-
Filesize
102KB
MD5c631b6819bbd3bf5baf1f083e7fa7a0a
SHA164c28952fb16ee998e435f8482d77f0e2b4a4996
SHA256a8ee29af1086b1cc0d24364d404337dc920a18619bf6e9e5db2ad9eb5233cba6
SHA512654386b2f9d82acdf1c10d1571175df3a5e941c6f224373d412c5732f24f14955bcbb35881d9ffc8d1cc9c315bd34ae8134160ddd684ba1abbec3e776191e3c2
-
Filesize
102KB
MD5c631b6819bbd3bf5baf1f083e7fa7a0a
SHA164c28952fb16ee998e435f8482d77f0e2b4a4996
SHA256a8ee29af1086b1cc0d24364d404337dc920a18619bf6e9e5db2ad9eb5233cba6
SHA512654386b2f9d82acdf1c10d1571175df3a5e941c6f224373d412c5732f24f14955bcbb35881d9ffc8d1cc9c315bd34ae8134160ddd684ba1abbec3e776191e3c2
-
Filesize
102KB
MD5c631b6819bbd3bf5baf1f083e7fa7a0a
SHA164c28952fb16ee998e435f8482d77f0e2b4a4996
SHA256a8ee29af1086b1cc0d24364d404337dc920a18619bf6e9e5db2ad9eb5233cba6
SHA512654386b2f9d82acdf1c10d1571175df3a5e941c6f224373d412c5732f24f14955bcbb35881d9ffc8d1cc9c315bd34ae8134160ddd684ba1abbec3e776191e3c2
-
Filesize
102KB
MD5c631b6819bbd3bf5baf1f083e7fa7a0a
SHA164c28952fb16ee998e435f8482d77f0e2b4a4996
SHA256a8ee29af1086b1cc0d24364d404337dc920a18619bf6e9e5db2ad9eb5233cba6
SHA512654386b2f9d82acdf1c10d1571175df3a5e941c6f224373d412c5732f24f14955bcbb35881d9ffc8d1cc9c315bd34ae8134160ddd684ba1abbec3e776191e3c2
-
Filesize
102KB
MD5c631b6819bbd3bf5baf1f083e7fa7a0a
SHA164c28952fb16ee998e435f8482d77f0e2b4a4996
SHA256a8ee29af1086b1cc0d24364d404337dc920a18619bf6e9e5db2ad9eb5233cba6
SHA512654386b2f9d82acdf1c10d1571175df3a5e941c6f224373d412c5732f24f14955bcbb35881d9ffc8d1cc9c315bd34ae8134160ddd684ba1abbec3e776191e3c2
-
Filesize
102KB
MD5c631b6819bbd3bf5baf1f083e7fa7a0a
SHA164c28952fb16ee998e435f8482d77f0e2b4a4996
SHA256a8ee29af1086b1cc0d24364d404337dc920a18619bf6e9e5db2ad9eb5233cba6
SHA512654386b2f9d82acdf1c10d1571175df3a5e941c6f224373d412c5732f24f14955bcbb35881d9ffc8d1cc9c315bd34ae8134160ddd684ba1abbec3e776191e3c2
-
Filesize
102KB
MD5c631b6819bbd3bf5baf1f083e7fa7a0a
SHA164c28952fb16ee998e435f8482d77f0e2b4a4996
SHA256a8ee29af1086b1cc0d24364d404337dc920a18619bf6e9e5db2ad9eb5233cba6
SHA512654386b2f9d82acdf1c10d1571175df3a5e941c6f224373d412c5732f24f14955bcbb35881d9ffc8d1cc9c315bd34ae8134160ddd684ba1abbec3e776191e3c2
-
Filesize
102KB
MD5c631b6819bbd3bf5baf1f083e7fa7a0a
SHA164c28952fb16ee998e435f8482d77f0e2b4a4996
SHA256a8ee29af1086b1cc0d24364d404337dc920a18619bf6e9e5db2ad9eb5233cba6
SHA512654386b2f9d82acdf1c10d1571175df3a5e941c6f224373d412c5732f24f14955bcbb35881d9ffc8d1cc9c315bd34ae8134160ddd684ba1abbec3e776191e3c2