Analysis
-
max time kernel
103s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:08
Static task
static1
Behavioral task
behavioral1
Sample
3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe
Resource
win10v2004-20221111-en
General
-
Target
3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe
-
Size
84KB
-
MD5
807d7df4fec62369f7bc2a96bafa9918
-
SHA1
ec4fca4ce446325d44aa20d19061efeb30a813ca
-
SHA256
3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234
-
SHA512
f7423ed791ff2f2999b7b243bcc7c3cc0d52f733cff8e60ea3fe533cc1e9db126226f17f3674a53638e48a87cccdb5872ccbc0da6e21ba0faa81c63bb0c7cc18
-
SSDEEP
1536:PDJ4XRAHPJ/lTpfpZnCPza8ZhYfjBgE/5Jv1h0VYo:PDlpZn18ZhmjBrJv0VYo
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/280-59-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral1/memory/280-62-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\0DA7C474 = "C:\\Windows\\0DA7C474\\svchsot.exe" 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe -
Drops file in Windows directory 2 IoCs
Processes:
3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exedescription ioc process File created C:\Windows\0DA7C474\svchsot.exe 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe File opened for modification C:\Windows\0DA7C474\svchsot.exe 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exepid process 280 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe 280 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe 280 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe 280 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exedescription pid process Token: SeDebugPrivilege 280 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe Token: SeDebugPrivilege 280 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exenet.exedescription pid process target process PID 280 wrote to memory of 1168 280 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe net.exe PID 280 wrote to memory of 1168 280 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe net.exe PID 280 wrote to memory of 1168 280 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe net.exe PID 280 wrote to memory of 1168 280 3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe net.exe PID 1168 wrote to memory of 1048 1168 net.exe net1.exe PID 1168 wrote to memory of 1048 1168 net.exe net1.exe PID 1168 wrote to memory of 1048 1168 net.exe net1.exe PID 1168 wrote to memory of 1048 1168 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe"C:\Users\Admin\AppData\Local\Temp\3e23546eba1ce30e08882faf7ae667dff08a85a79b264ecf0345a11d0d174234.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:1048