Analysis
-
max time kernel
201s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:47
Static task
static1
Behavioral task
behavioral1
Sample
ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe
Resource
win10v2004-20221111-en
General
-
Target
ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe
-
Size
94KB
-
MD5
85a6c16d6ec612b431d71435dd753580
-
SHA1
7590f2ef4a077926d71336e623a80dc00fa3d014
-
SHA256
ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe
-
SHA512
cd29404afc5f980f2af2d591195f9154515404ba5646a3990442a34bfc5e2aca9a417a98069b34c4b0f6b99a033b62f8837591b8d913f33277ceb2839aac7aec
-
SSDEEP
1536:BFQwQsiEoa2BhmUB4I+yuDg1uUO2mntP2qZNKHuNMaSJETxmIGykRZhcMePmrOa:BFQwQhEOLfuDg0PtOqzKONqsEykRLSeP
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3660-135-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/3660-134-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/3660-136-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat -
Processes:
resource yara_rule behavioral2/memory/3660-132-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/3660-135-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/3660-134-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/3660-136-0x0000000010000000-0x000000001003B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\99942989 = "C:\\Windows\\99942989\\svchsot.exe" ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5020 3660 WerFault.exe ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe 4272 3660 WerFault.exe ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exepid process 3660 ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe 3660 ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe 3660 ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe 3660 ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe 3660 ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe 3660 ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exepid process 3660 ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exedescription pid process Token: SeDebugPrivilege 3660 ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exenet.exedescription pid process target process PID 3660 wrote to memory of 1988 3660 ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe net.exe PID 3660 wrote to memory of 1988 3660 ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe net.exe PID 3660 wrote to memory of 1988 3660 ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe net.exe PID 1988 wrote to memory of 2008 1988 net.exe net1.exe PID 1988 wrote to memory of 2008 1988 net.exe net1.exe PID 1988 wrote to memory of 2008 1988 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe"C:\Users\Admin\AppData\Local\Temp\ebd2f0eda75704d4c27a2f55efee16d00b8512cffddee4c3f7c8f6bf5a19d0fe.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 6082⤵
- Program crash
PID:5020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 6162⤵
- Program crash
PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3660 -ip 36601⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3660 -ip 36601⤵PID:3140