Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:50
Static task
static1
Behavioral task
behavioral1
Sample
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe
Resource
win7-20220812-en
General
-
Target
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe
-
Size
149KB
-
MD5
1c025f5eb807160386709774fae56cca
-
SHA1
530af30e60a5ce3b98cd1ab3d435c6e0b01d2089
-
SHA256
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0
-
SHA512
70ac623e54ff7d5cd80040aeb6023f1e4508161cfaddef5df1e1c4fd79f4419c5ecb0c2fb7fe4ba100977612a855eefda37517b30623afe23bb5353e84bb9598
-
SSDEEP
3072:SKWWYPNdBtKdjkta66RHY0vL8+C7O0mlxVV:VQ0Vv66R4mU1mln
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1248-55-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat behavioral1/memory/1248-57-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat behavioral1/memory/860-63-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat behavioral1/memory/1248-65-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat behavioral1/memory/860-69-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
Processes:
gaycwq.exepid process 860 gaycwq.exe -
Deletes itself 1 IoCs
Processes:
WScript.exepid process 1124 WScript.exe -
Drops file in Windows directory 2 IoCs
Processes:
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exedescription ioc process File opened for modification C:\Windows\gaycwq.exe e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe File created C:\Windows\gaycwq.exe e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exegaycwq.exepid process 1248 e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe 860 gaycwq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exedescription pid process target process PID 1248 wrote to memory of 1124 1248 e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe WScript.exe PID 1248 wrote to memory of 1124 1248 e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe WScript.exe PID 1248 wrote to memory of 1124 1248 e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe WScript.exe PID 1248 wrote to memory of 1124 1248 e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe"C:\Users\Admin\AppData\Local\Temp\e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\1899.vbs"2⤵
- Deletes itself
PID:1124
-
-
C:\Windows\gaycwq.exeC:\Windows\gaycwq.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD59f57192b086265a8ffcd40b343fcaffd
SHA186cd8d0a4b9bcc6417c1ec59af3a69c8073bb2c7
SHA2568d9f57d102954bf6a9ac08f75b7e5fabcf7c84668359a1daa132b72905dc2143
SHA512f9de1e1679f311d97aa48b9c8153217d76d92e147858717dba5f894dd4d46c98604ec803e514d6f168dda97f3ad25a390ce1d4ef199199c0a27abbec815bfde9
-
Filesize
149KB
MD51c025f5eb807160386709774fae56cca
SHA1530af30e60a5ce3b98cd1ab3d435c6e0b01d2089
SHA256e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0
SHA51270ac623e54ff7d5cd80040aeb6023f1e4508161cfaddef5df1e1c4fd79f4419c5ecb0c2fb7fe4ba100977612a855eefda37517b30623afe23bb5353e84bb9598
-
Filesize
149KB
MD51c025f5eb807160386709774fae56cca
SHA1530af30e60a5ce3b98cd1ab3d435c6e0b01d2089
SHA256e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0
SHA51270ac623e54ff7d5cd80040aeb6023f1e4508161cfaddef5df1e1c4fd79f4419c5ecb0c2fb7fe4ba100977612a855eefda37517b30623afe23bb5353e84bb9598