Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:54
Behavioral task
behavioral1
Sample
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe
Resource
win10v2004-20220812-en
General
-
Target
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe
-
Size
53KB
-
MD5
63486e0d37842afa5338c5701316ac77
-
SHA1
7cfd930ad25285670603433ea0ba4d08f9d888a8
-
SHA256
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da
-
SHA512
ad12e782d1f4d62568e7c83124a115af770760efcc14df46e9c712d2176e07b8f545fbd30997ac256133fa5fe2183d11c4a5609831c2ea28acaaf1322cafb78b
-
SSDEEP
768:O5fOJfRLdj3GO9a4Vei/Qzm0GYE7Gnmhw/HjSL+oVQ3A71WGuT/XzTR1yQEVGxCF:O5afRxiGa4hlvy8Ws+oQw74Gw/X3GU
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/828-55-0x0000000000400000-0x0000000000421000-memory.dmp family_gh0strat \??\c:\windows\SysWOW64\mstsc.admin.8.dll family_gh0strat \Windows\SysWOW64\mstsc.admin.8.dll family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Microsoft Safe Sever 1.0\Parameters\ServiceDll = "C:\\Windows\\system32\\mstsc.admin.8.dll" a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe -
Processes:
resource yara_rule behavioral1/memory/828-55-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 976 svchost.exe -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 976 svchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exedescription ioc process File created C:\Windows\SysWOW64\mstsc.admin.8.dll a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe"C:\Users\Admin\AppData\Local\Temp\a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\c:\windows\SysWOW64\mstsc.admin.8.dllFilesize
104KB
MD5083dbb6e684ad6451b09f12d737cffbc
SHA1a588399511f4933db23494e75b79881b1600e348
SHA25666123f91ca658ecdb758a97834035838b117feee740b14f00ba1d84664cab80a
SHA512635019aeee56768e074eef3db0eb201f5be7bea648cc4bceb89eb52e4c060e6eb0fb7ecbc10d599916a389e0ddc39548d2ea161d0ec7f5f55f6ba328fb18b8d7
-
\Windows\SysWOW64\mstsc.admin.8.dllFilesize
104KB
MD5083dbb6e684ad6451b09f12d737cffbc
SHA1a588399511f4933db23494e75b79881b1600e348
SHA25666123f91ca658ecdb758a97834035838b117feee740b14f00ba1d84664cab80a
SHA512635019aeee56768e074eef3db0eb201f5be7bea648cc4bceb89eb52e4c060e6eb0fb7ecbc10d599916a389e0ddc39548d2ea161d0ec7f5f55f6ba328fb18b8d7
-
memory/828-55-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/976-57-0x0000000075BB1000-0x0000000075BB3000-memory.dmpFilesize
8KB