Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:54
Behavioral task
behavioral1
Sample
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe
Resource
win10v2004-20220812-en
General
-
Target
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe
-
Size
53KB
-
MD5
63486e0d37842afa5338c5701316ac77
-
SHA1
7cfd930ad25285670603433ea0ba4d08f9d888a8
-
SHA256
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da
-
SHA512
ad12e782d1f4d62568e7c83124a115af770760efcc14df46e9c712d2176e07b8f545fbd30997ac256133fa5fe2183d11c4a5609831c2ea28acaaf1322cafb78b
-
SSDEEP
768:O5fOJfRLdj3GO9a4Vei/Qzm0GYE7Gnmhw/HjSL+oVQ3A71WGuT/XzTR1yQEVGxCF:O5afRxiGa4hlvy8Ws+oQw74Gw/X3GU
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/5044-133-0x0000000000400000-0x0000000000421000-memory.dmp family_gh0strat \??\c:\windows\SysWOW64\mstsc.admin.8.dll family_gh0strat C:\Windows\SysWOW64\mstsc.admin.8.dll family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Microsoft Safe Sever 1.0\Parameters\ServiceDll = "C:\\Windows\\system32\\mstsc.admin.8.dll" a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe -
Processes:
resource yara_rule behavioral2/memory/5044-133-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 1140 svchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exedescription ioc process File created C:\Windows\SysWOW64\mstsc.admin.8.dll a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe"C:\Users\Admin\AppData\Local\Temp\a2acf5af32449d14e33b3fcb74b3792a699b3c70edb3f84055157070889422da.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
PID:5044
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1140
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5083dbb6e684ad6451b09f12d737cffbc
SHA1a588399511f4933db23494e75b79881b1600e348
SHA25666123f91ca658ecdb758a97834035838b117feee740b14f00ba1d84664cab80a
SHA512635019aeee56768e074eef3db0eb201f5be7bea648cc4bceb89eb52e4c060e6eb0fb7ecbc10d599916a389e0ddc39548d2ea161d0ec7f5f55f6ba328fb18b8d7
-
Filesize
104KB
MD5083dbb6e684ad6451b09f12d737cffbc
SHA1a588399511f4933db23494e75b79881b1600e348
SHA25666123f91ca658ecdb758a97834035838b117feee740b14f00ba1d84664cab80a
SHA512635019aeee56768e074eef3db0eb201f5be7bea648cc4bceb89eb52e4c060e6eb0fb7ecbc10d599916a389e0ddc39548d2ea161d0ec7f5f55f6ba328fb18b8d7