Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 10:27
Static task
static1
Behavioral task
behavioral1
Sample
84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe
Resource
win7-20220812-en
General
-
Target
84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe
-
Size
925KB
-
MD5
394277e5e016005e96ded8342bfeb041
-
SHA1
26762b55abd3f375dffb662ccf252901d82e2538
-
SHA256
84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd
-
SHA512
ad73aa78852ee36e67546ecd1b106ab1bc88491ab7a73b154eee1a8d039879d88ec87fe371f2c4fcbcb1d2a3d254ebe0dc970f0d0c4261b2c88c12774c015311
-
SSDEEP
24576:jkr7jT4WOCtG3r9WyErEwk664hq/ERAfHYI:jOIpj3r9WyEr04yEWvR
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1064-76-0x0000000010000000-0x000000001001F000-memory.dmp family_gh0strat -
Executes dropped EXE 5 IoCs
Processes:
jb.exescvhost.exe2.exeMFC71CHS.exefsfdkygutlpid process 1940 jb.exe 1064 scvhost.exe 2008 2.exe 2024 MFC71CHS.exe 1720 fsfdkygutl -
Loads dropped DLL 8 IoCs
Processes:
84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exejb.exepid process 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe 1940 jb.exe -
Drops file in System32 directory 5 IoCs
Processes:
2.exedescription ioc process File created C:\Windows\System32\1235DC.tmp 2.exe File opened for modification C:\Windows\SysWOW64\1235DC.tmp 2.exe File created C:\Windows\System32\1236A8.tmp 2.exe File opened for modification C:\Windows\SysWOW64\1236A8.tmp 2.exe File created C:\Windows\SysWOW64\sxload.tmp 2.exe -
Drops file in Program Files directory 1 IoCs
Processes:
2.exedescription ioc process File created C:\Program Files (x86)\Common Files\sx998.tmp 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 988 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
scvhost.exejb.exepid process 1064 scvhost.exe 1940 jb.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
2.exetaskkill.exejb.exedescription pid process Token: SeDebugPrivilege 2008 2.exe Token: SeDebugPrivilege 988 taskkill.exe Token: SeRestorePrivilege 1940 jb.exe Token: SeBackupPrivilege 1940 jb.exe Token: SeBackupPrivilege 1940 jb.exe Token: SeRestorePrivilege 1940 jb.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
2.exepid process 2008 2.exe 2008 2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
scvhost.exepid process 1064 scvhost.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe2.exedescription pid process target process PID 1908 wrote to memory of 1940 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe jb.exe PID 1908 wrote to memory of 1940 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe jb.exe PID 1908 wrote to memory of 1940 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe jb.exe PID 1908 wrote to memory of 1940 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe jb.exe PID 1908 wrote to memory of 1064 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe scvhost.exe PID 1908 wrote to memory of 1064 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe scvhost.exe PID 1908 wrote to memory of 1064 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe scvhost.exe PID 1908 wrote to memory of 1064 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe scvhost.exe PID 1908 wrote to memory of 2008 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe 2.exe PID 1908 wrote to memory of 2008 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe 2.exe PID 1908 wrote to memory of 2008 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe 2.exe PID 1908 wrote to memory of 2008 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe 2.exe PID 1908 wrote to memory of 2024 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe MFC71CHS.exe PID 1908 wrote to memory of 2024 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe MFC71CHS.exe PID 1908 wrote to memory of 2024 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe MFC71CHS.exe PID 1908 wrote to memory of 2024 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe MFC71CHS.exe PID 1908 wrote to memory of 2024 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe MFC71CHS.exe PID 1908 wrote to memory of 2024 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe MFC71CHS.exe PID 1908 wrote to memory of 2024 1908 84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe MFC71CHS.exe PID 2008 wrote to memory of 988 2008 2.exe taskkill.exe PID 2008 wrote to memory of 988 2008 2.exe taskkill.exe PID 2008 wrote to memory of 988 2008 2.exe taskkill.exe PID 2008 wrote to memory of 988 2008 2.exe taskkill.exe PID 2008 wrote to memory of 1544 2008 2.exe cmd.exe PID 2008 wrote to memory of 1544 2008 2.exe cmd.exe PID 2008 wrote to memory of 1544 2008 2.exe cmd.exe PID 2008 wrote to memory of 1544 2008 2.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe"C:\Users\Admin\AppData\Local\Temp\84ae8210cc078e2962be9bb62ff3ff5eb2eaae7f87296a545803b18527521dcd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jb.exe"C:\Users\Admin\AppData\Local\Temp\jb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\users\admin\appdata\local\fsfdkygutl"C:\Users\Admin\AppData\Local\Temp\jb.exe" a -sc:\users\admin\appdata\local\temp\jb.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\scvhost.exe"C:\Users\Admin\AppData\Local\Temp\scvhost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "GamePlaza.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c 1.bat3⤵
-
C:\Users\Admin\AppData\Local\Temp\MFC71CHS.exe"C:\Users\Admin\AppData\Local\Temp\MFC71CHS.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1.batFilesize
125B
MD53b7dd85c6011192882bad9eda56a79f3
SHA1898067776de1931b3e35a3ce9728b25c063dbf50
SHA256f70d667736dd2c4a4739e78b3c052616aaf647a95dbb9e562124337e29793c17
SHA5129a051dc0c1d6f4df181f97744b71c5e4f0670040c3b8501436c555b299a762cbf5b7e7c3ab6d1b4e414477f2717cab404fe4652e11b5bc008f7e21c84dd80764
-
C:\Users\Admin\AppData\Local\Temp\2.exeFilesize
16KB
MD5bb50b21e70f4f92ee7624c7801d45e55
SHA1d704aab549c11c239e9700eb34c6175453088ac2
SHA256ba26c68192155b7bd230aa25f74922c4e382b23721e79fdff0119e444a5fc238
SHA5128c2aa6236d0a1246ad976dab8ad9f7ff6323753afeede6de3f50f7c2f100188a3737a4c90125eeec8f7122f612f3c4098b83a873aa35c9a66e8713d1b1f14948
-
C:\Users\Admin\AppData\Local\Temp\2.exeFilesize
16KB
MD5bb50b21e70f4f92ee7624c7801d45e55
SHA1d704aab549c11c239e9700eb34c6175453088ac2
SHA256ba26c68192155b7bd230aa25f74922c4e382b23721e79fdff0119e444a5fc238
SHA5128c2aa6236d0a1246ad976dab8ad9f7ff6323753afeede6de3f50f7c2f100188a3737a4c90125eeec8f7122f612f3c4098b83a873aa35c9a66e8713d1b1f14948
-
C:\Users\Admin\AppData\Local\Temp\MFC71CHS.exeFilesize
543KB
MD5ef3bda86cfc2991018f32092d3b01b25
SHA15ddfcfe2ed6fae903473bed84bd96ad83c1c8b15
SHA2564e0e7d383f30a6f14dd03c01ae74b3cfbe18b980589134e38d96c089fd6d5314
SHA5128c2d1cbfb4186a8b87cedfe98ca9b35952e13a0c0cbaed21b16d289ebd9e7f053cfde4ccf6e7ce09ab2a6813a949d670790f7ff5ed2722a3cf7a1e9c89e99dcd
-
C:\Users\Admin\AppData\Local\Temp\MFC71CHS.exeFilesize
543KB
MD5ef3bda86cfc2991018f32092d3b01b25
SHA15ddfcfe2ed6fae903473bed84bd96ad83c1c8b15
SHA2564e0e7d383f30a6f14dd03c01ae74b3cfbe18b980589134e38d96c089fd6d5314
SHA5128c2d1cbfb4186a8b87cedfe98ca9b35952e13a0c0cbaed21b16d289ebd9e7f053cfde4ccf6e7ce09ab2a6813a949d670790f7ff5ed2722a3cf7a1e9c89e99dcd
-
C:\Users\Admin\AppData\Local\Temp\jb.exeFilesize
196KB
MD5d9f0d856a12a5b34aa5801f71d930bbc
SHA19c4cda360b5b4b4b43c99782afcc159b9710e554
SHA256fd4c618f459ede2868d1846c50a3996fc874342afd18e264dfcb3725a3712269
SHA51270b95bd3d1a409ca3dc89e179eced8258ef46d2d52dd8b1f8e9abd1a3496319f0e3c3b7ac0a476440b15ee6a716c5bcc0d479105ee3c12db67bbba90232e336f
-
C:\Users\Admin\AppData\Local\Temp\scvhost.exeFilesize
137KB
MD502f1a88947345170ed8f01779baa2645
SHA14e2cd34f2f8e6ea4e0fa06ba3de7f539aaf96293
SHA2560121a9201574d372d625d49f1975fd1c90c2cc871bf06cd1bec9f557e9fa1e3b
SHA5125b9da92bb3dc3f9c9757dbc9deda51eab33e3d5bd0c4ed54dae8b29453c392149aca240a3e7f34b1b3dacc29680dd5b1cbd97b3509e633c6d3486cbd932ebe75
-
C:\Users\Admin\AppData\Local\fsfdkygutlFilesize
19.7MB
MD53b8767730efc272fe201c6427ff03f1a
SHA1b5a3d85cc7c4e9e978e50ca431d301c7ce1d8b56
SHA2564372caed4dd3e835a240ce53597d958b1dea1c5c71080b357773247b4af54bc4
SHA51299eac1e74afdd19cad6e90ee62c19f81ec6e0d1b9b48de8bbdb17d17a05ea70df24c7b51673612c6c6e8086fc8bc925953d9279a09d6924f0b4c62c50334cc7a
-
\??\c:\users\admin\appdata\local\temp\jb.exeFilesize
196KB
MD5d9f0d856a12a5b34aa5801f71d930bbc
SHA19c4cda360b5b4b4b43c99782afcc159b9710e554
SHA256fd4c618f459ede2868d1846c50a3996fc874342afd18e264dfcb3725a3712269
SHA51270b95bd3d1a409ca3dc89e179eced8258ef46d2d52dd8b1f8e9abd1a3496319f0e3c3b7ac0a476440b15ee6a716c5bcc0d479105ee3c12db67bbba90232e336f
-
\Users\Admin\AppData\Local\Temp\2.exeFilesize
16KB
MD5bb50b21e70f4f92ee7624c7801d45e55
SHA1d704aab549c11c239e9700eb34c6175453088ac2
SHA256ba26c68192155b7bd230aa25f74922c4e382b23721e79fdff0119e444a5fc238
SHA5128c2aa6236d0a1246ad976dab8ad9f7ff6323753afeede6de3f50f7c2f100188a3737a4c90125eeec8f7122f612f3c4098b83a873aa35c9a66e8713d1b1f14948
-
\Users\Admin\AppData\Local\Temp\2.exeFilesize
16KB
MD5bb50b21e70f4f92ee7624c7801d45e55
SHA1d704aab549c11c239e9700eb34c6175453088ac2
SHA256ba26c68192155b7bd230aa25f74922c4e382b23721e79fdff0119e444a5fc238
SHA5128c2aa6236d0a1246ad976dab8ad9f7ff6323753afeede6de3f50f7c2f100188a3737a4c90125eeec8f7122f612f3c4098b83a873aa35c9a66e8713d1b1f14948
-
\Users\Admin\AppData\Local\Temp\MFC71CHS.exeFilesize
543KB
MD5ef3bda86cfc2991018f32092d3b01b25
SHA15ddfcfe2ed6fae903473bed84bd96ad83c1c8b15
SHA2564e0e7d383f30a6f14dd03c01ae74b3cfbe18b980589134e38d96c089fd6d5314
SHA5128c2d1cbfb4186a8b87cedfe98ca9b35952e13a0c0cbaed21b16d289ebd9e7f053cfde4ccf6e7ce09ab2a6813a949d670790f7ff5ed2722a3cf7a1e9c89e99dcd
-
\Users\Admin\AppData\Local\Temp\jb.exeFilesize
196KB
MD5d9f0d856a12a5b34aa5801f71d930bbc
SHA19c4cda360b5b4b4b43c99782afcc159b9710e554
SHA256fd4c618f459ede2868d1846c50a3996fc874342afd18e264dfcb3725a3712269
SHA51270b95bd3d1a409ca3dc89e179eced8258ef46d2d52dd8b1f8e9abd1a3496319f0e3c3b7ac0a476440b15ee6a716c5bcc0d479105ee3c12db67bbba90232e336f
-
\Users\Admin\AppData\Local\Temp\jb.exeFilesize
196KB
MD5d9f0d856a12a5b34aa5801f71d930bbc
SHA19c4cda360b5b4b4b43c99782afcc159b9710e554
SHA256fd4c618f459ede2868d1846c50a3996fc874342afd18e264dfcb3725a3712269
SHA51270b95bd3d1a409ca3dc89e179eced8258ef46d2d52dd8b1f8e9abd1a3496319f0e3c3b7ac0a476440b15ee6a716c5bcc0d479105ee3c12db67bbba90232e336f
-
\Users\Admin\AppData\Local\Temp\scvhost.exeFilesize
137KB
MD502f1a88947345170ed8f01779baa2645
SHA14e2cd34f2f8e6ea4e0fa06ba3de7f539aaf96293
SHA2560121a9201574d372d625d49f1975fd1c90c2cc871bf06cd1bec9f557e9fa1e3b
SHA5125b9da92bb3dc3f9c9757dbc9deda51eab33e3d5bd0c4ed54dae8b29453c392149aca240a3e7f34b1b3dacc29680dd5b1cbd97b3509e633c6d3486cbd932ebe75
-
\Users\Admin\AppData\Local\Temp\scvhost.exeFilesize
137KB
MD502f1a88947345170ed8f01779baa2645
SHA14e2cd34f2f8e6ea4e0fa06ba3de7f539aaf96293
SHA2560121a9201574d372d625d49f1975fd1c90c2cc871bf06cd1bec9f557e9fa1e3b
SHA5125b9da92bb3dc3f9c9757dbc9deda51eab33e3d5bd0c4ed54dae8b29453c392149aca240a3e7f34b1b3dacc29680dd5b1cbd97b3509e633c6d3486cbd932ebe75
-
\Users\Admin\AppData\Local\fsfdkygutlFilesize
19.7MB
MD53b8767730efc272fe201c6427ff03f1a
SHA1b5a3d85cc7c4e9e978e50ca431d301c7ce1d8b56
SHA2564372caed4dd3e835a240ce53597d958b1dea1c5c71080b357773247b4af54bc4
SHA51299eac1e74afdd19cad6e90ee62c19f81ec6e0d1b9b48de8bbdb17d17a05ea70df24c7b51673612c6c6e8086fc8bc925953d9279a09d6924f0b4c62c50334cc7a
-
memory/988-82-0x0000000000000000-mapping.dmp
-
memory/1064-76-0x0000000010000000-0x000000001001F000-memory.dmpFilesize
124KB
-
memory/1064-62-0x0000000000000000-mapping.dmp
-
memory/1544-83-0x0000000000000000-mapping.dmp
-
memory/1720-90-0x0000000000400000-0x0000000000432800-memory.dmpFilesize
202KB
-
memory/1908-55-0x0000000000400000-0x00000000004F0000-memory.dmpFilesize
960KB
-
memory/1908-73-0x0000000000400000-0x00000000004F0000-memory.dmpFilesize
960KB
-
memory/1908-54-0x00000000753C1000-0x00000000753C3000-memory.dmpFilesize
8KB
-
memory/1940-58-0x0000000000000000-mapping.dmp
-
memory/1940-86-0x0000000000400000-0x0000000000432800-memory.dmpFilesize
202KB
-
memory/1940-85-0x0000000000400000-0x0000000000432800-memory.dmpFilesize
202KB
-
memory/1940-91-0x0000000000220000-0x0000000000253000-memory.dmpFilesize
204KB
-
memory/1940-92-0x0000000000220000-0x0000000000253000-memory.dmpFilesize
204KB
-
memory/2008-66-0x0000000000000000-mapping.dmp
-
memory/2008-81-0x0000000073E11000-0x0000000073E13000-memory.dmpFilesize
8KB
-
memory/2024-71-0x0000000000000000-mapping.dmp