Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe
Resource
win10v2004-20220812-en
General
-
Target
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe
-
Size
80KB
-
MD5
1aaff2441611ce9500a464e83de078b8
-
SHA1
072fac4e85066924fb49805c8640d43ade483e95
-
SHA256
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7
-
SHA512
27c06c823fd5d74e4be0b41fead22d6c44104fb5a92aa63f716a96f87ea46759ff1848dd557d8c19248b37f42f0ff273a2fd7296238a431ddc3e9b648fc009cc
-
SSDEEP
1536:sFz0LnC0atiq+9Cc73McaTBFb0bJ+oa/xrpnHTlyojsjxNe22JjIHM:sFz90hq+Yc7Hf4oa5r5sojsj+oM
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5016-134-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/5016-135-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/5016-138-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\2ECAFBBA = "C:\\Windows\\2ECAFBBA\\svchsot.exe" bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe -
Drops file in System32 directory 1 IoCs
Processes:
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Default bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe -
Drops file in Windows directory 2 IoCs
Processes:
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exedescription ioc process File created C:\Windows\2ECAFBBA\svchsot.exe bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe File opened for modification C:\Windows\2ECAFBBA\svchsot.exe bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exepid process 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exedescription pid process Token: SeDebugPrivilege 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe Token: SeDebugPrivilege 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exenet.exedescription pid process target process PID 5016 wrote to memory of 3132 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe net.exe PID 5016 wrote to memory of 3132 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe net.exe PID 5016 wrote to memory of 3132 5016 bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe net.exe PID 3132 wrote to memory of 2376 3132 net.exe net1.exe PID 3132 wrote to memory of 2376 3132 net.exe net1.exe PID 3132 wrote to memory of 2376 3132 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe"C:\Users\Admin\AppData\Local\Temp\bb3343011933ca1341f222484068fd39fa2acd639645c3df172a9dc32f89bfd7.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:2376