Analysis
-
max time kernel
152s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 16:13
Behavioral task
behavioral1
Sample
cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe
Resource
win10v2004-20220812-en
General
-
Target
cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe
-
Size
108KB
-
MD5
1504dfe8b0ea4fafd3f715543f166450
-
SHA1
5d54d4bf23a7f2b2ba5711807b234ac77df62761
-
SHA256
cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c
-
SHA512
4cbad4ce15ef265d1d5c8fa042c79b633d08174db9fdbd847a089b269d1dcc32fa6f57fbaf39a8afc5562092a32c199d1366d08d2d5fc51d27ef75225477f709
-
SSDEEP
3072:JMWQSyGtNZVqFEbYJutd8SVOR+adwbdTw+KBZF/XA:JMWQSyGJVqFGYktGD+6sdw+6r/w
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral2/memory/2260-132-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022e5e-134.dat family_gh0strat behavioral2/memory/2260-135-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022e5e-136.dat family_gh0strat behavioral2/memory/5080-137-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat behavioral2/memory/5080-138-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility360.dll" cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe -
Loads dropped DLL 1 IoCs
pid Process 5080 SVCHOST.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility360.dll cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe -
Kills process with taskkill 1 IoCs
pid Process 4064 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4064 taskkill.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2260 wrote to memory of 4064 2260 cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe 80 PID 2260 wrote to memory of 4064 2260 cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe 80 PID 2260 wrote to memory of 4064 2260 cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe"C:\Users\Admin\AppData\Local\Temp\cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im RSTray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\SysWOW64\SVCHOST.EXEC:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:5080
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD54a5fff2d7f3f4252ea6b63970538385b
SHA128d4de211be989ebf511c0106e700afeb9469445
SHA256aa44e79d9847968cad0309fbaa86b387d294af2a09bf113338c1f87df66773dd
SHA51267d52e6454aad62e64a6dda8540ca8c8917a71ba0e901b4dfddeec2fc2abfbe9b700cb9c56522bd263752c6d924b299a133afbd3609981540e95b2a58807ffaa
-
Filesize
96KB
MD54a5fff2d7f3f4252ea6b63970538385b
SHA128d4de211be989ebf511c0106e700afeb9469445
SHA256aa44e79d9847968cad0309fbaa86b387d294af2a09bf113338c1f87df66773dd
SHA51267d52e6454aad62e64a6dda8540ca8c8917a71ba0e901b4dfddeec2fc2abfbe9b700cb9c56522bd263752c6d924b299a133afbd3609981540e95b2a58807ffaa