Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 14:28
Behavioral task
behavioral1
Sample
821ba56198151720b059f01f456381c92ec98e3917fa1104a3b337a04dd14eb2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
821ba56198151720b059f01f456381c92ec98e3917fa1104a3b337a04dd14eb2.exe
Resource
win10v2004-20220812-en
General
-
Target
821ba56198151720b059f01f456381c92ec98e3917fa1104a3b337a04dd14eb2.exe
-
Size
113KB
-
MD5
0f8750b44e7ac7abf22b3649f8fcaca9
-
SHA1
95d6f00feab3da4c7d334b1974401d972afdcecc
-
SHA256
821ba56198151720b059f01f456381c92ec98e3917fa1104a3b337a04dd14eb2
-
SHA512
d66916764ced513f8f309f1678e0f988c6fe6ba41bb0a3133d1404bbecce67495f801f76317cc507c9fdc226bab378840f85588ed4ecc1662473c38d05ffa87a
-
SSDEEP
3072:t7Q8mB+lZ6RUj3g1xjnihO0BmQSiDQGCBTwXDoL:t7Q8uZ+j3y1i0/9iDdCBEXDoL
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/5064-132-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat behavioral2/memory/5064-134-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat behavioral2/files/0x0007000000022e5a-133.dat family_gh0strat behavioral2/files/0x0007000000022e5a-135.dat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Microsoft MR\Parameters\ServiceDll = "C:\\Windows\\system32\\360SP2.dll" 821ba56198151720b059f01f456381c92ec98e3917fa1104a3b337a04dd14eb2.exe -
Loads dropped DLL 1 IoCs
pid Process 4012 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\360SP2.dll 821ba56198151720b059f01f456381c92ec98e3917fa1104a3b337a04dd14eb2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\821ba56198151720b059f01f456381c92ec98e3917fa1104a3b337a04dd14eb2.exe"C:\Users\Admin\AppData\Local\Temp\821ba56198151720b059f01f456381c92ec98e3917fa1104a3b337a04dd14eb2.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
PID:5064
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:4012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD559a753fbc6d82d2e0b3e64f6f93d374c
SHA16efe9922b2b76984435657a3f9fb6d842975160a
SHA256ad1d05039408070cdeca5039c3cb744cab0970587993586e27d11a907d90e93f
SHA5121ccdadf1b5d338f70820ae5a325d81777b46aeb6525264b8121e617e38e1677dbcf8dd6abd73fe8124f00e578546327231ded5bf8258b5c422849419995992c9
-
Filesize
106KB
MD559a753fbc6d82d2e0b3e64f6f93d374c
SHA16efe9922b2b76984435657a3f9fb6d842975160a
SHA256ad1d05039408070cdeca5039c3cb744cab0970587993586e27d11a907d90e93f
SHA5121ccdadf1b5d338f70820ae5a325d81777b46aeb6525264b8121e617e38e1677dbcf8dd6abd73fe8124f00e578546327231ded5bf8258b5c422849419995992c9