Analysis
-
max time kernel
164s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:50
Static task
static1
Behavioral task
behavioral1
Sample
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe
Resource
win7-20220812-en
General
-
Target
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe
-
Size
149KB
-
MD5
1c025f5eb807160386709774fae56cca
-
SHA1
530af30e60a5ce3b98cd1ab3d435c6e0b01d2089
-
SHA256
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0
-
SHA512
70ac623e54ff7d5cd80040aeb6023f1e4508161cfaddef5df1e1c4fd79f4419c5ecb0c2fb7fe4ba100977612a855eefda37517b30623afe23bb5353e84bb9598
-
SSDEEP
3072:SKWWYPNdBtKdjkta66RHY0vL8+C7O0mlxVV:VQ0Vv66R4mU1mln
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1364-132-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat behavioral2/memory/1364-136-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat behavioral2/memory/3536-139-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat behavioral2/memory/1364-141-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat behavioral2/memory/3536-143-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
Processes:
vabdau.exepid process 3536 vabdau.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe -
Drops file in Windows directory 2 IoCs
Processes:
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exedescription ioc process File created C:\Windows\vabdau.exe e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe File opened for modification C:\Windows\vabdau.exe e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exevabdau.exepid process 1364 e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe 1364 e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe 3536 vabdau.exe 3536 vabdau.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exedescription pid process target process PID 1364 wrote to memory of 4744 1364 e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe WScript.exe PID 1364 wrote to memory of 4744 1364 e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe WScript.exe PID 1364 wrote to memory of 4744 1364 e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe"C:\Users\Admin\AppData\Local\Temp\e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\9208.vbs"2⤵PID:4744
-
-
C:\Windows\vabdau.exeC:\Windows\vabdau.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3536
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD59f57192b086265a8ffcd40b343fcaffd
SHA186cd8d0a4b9bcc6417c1ec59af3a69c8073bb2c7
SHA2568d9f57d102954bf6a9ac08f75b7e5fabcf7c84668359a1daa132b72905dc2143
SHA512f9de1e1679f311d97aa48b9c8153217d76d92e147858717dba5f894dd4d46c98604ec803e514d6f168dda97f3ad25a390ce1d4ef199199c0a27abbec815bfde9
-
Filesize
149KB
MD51c025f5eb807160386709774fae56cca
SHA1530af30e60a5ce3b98cd1ab3d435c6e0b01d2089
SHA256e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0
SHA51270ac623e54ff7d5cd80040aeb6023f1e4508161cfaddef5df1e1c4fd79f4419c5ecb0c2fb7fe4ba100977612a855eefda37517b30623afe23bb5353e84bb9598
-
Filesize
149KB
MD51c025f5eb807160386709774fae56cca
SHA1530af30e60a5ce3b98cd1ab3d435c6e0b01d2089
SHA256e63d21ff2ebf3ff83c84ad5f933cd65e73fbed228c24db203a4fd2c685c33cc0
SHA51270ac623e54ff7d5cd80040aeb6023f1e4508161cfaddef5df1e1c4fd79f4419c5ecb0c2fb7fe4ba100977612a855eefda37517b30623afe23bb5353e84bb9598