Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe
Resource
win10v2004-20220812-en
General
-
Target
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe
-
Size
80KB
-
MD5
1aaff2441611ce9500a464e83de078b8
-
SHA1
072fac4e85066924fb49805c8640d43ade483e95
-
SHA256
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7
-
SHA512
27c06c823fd5d74e4be0b41fead22d6c44104fb5a92aa63f716a96f87ea46759ff1848dd557d8c19248b37f42f0ff273a2fd7296238a431ddc3e9b648fc009cc
-
SSDEEP
1536:sFz0LnC0atiq+9Cc73McaTBFb0bJ+oa/xrpnHTlyojsjxNe22JjIHM:sFz90hq+Yc7Hf4oa5r5sojsj+oM
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/872-57-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral1/memory/872-61-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\2ECAFBBA = "C:\\Windows\\2ECAFBBA\\svchsot.exe" bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe -
Drops file in Windows directory 2 IoCs
Processes:
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exedescription ioc process File opened for modification C:\Windows\2ECAFBBA\svchsot.exe bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe File created C:\Windows\2ECAFBBA\svchsot.exe bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exepid process 872 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe 872 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe 872 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe 872 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exedescription pid process Token: SeDebugPrivilege 872 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe Token: SeDebugPrivilege 872 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exenet.exedescription pid process target process PID 872 wrote to memory of 836 872 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe net.exe PID 872 wrote to memory of 836 872 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe net.exe PID 872 wrote to memory of 836 872 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe net.exe PID 872 wrote to memory of 836 872 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe net.exe PID 836 wrote to memory of 1076 836 net.exe net1.exe PID 836 wrote to memory of 1076 836 net.exe net1.exe PID 836 wrote to memory of 1076 836 net.exe net1.exe PID 836 wrote to memory of 1076 836 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe"C:\Users\Admin\AppData\Local\Temp\bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:1076