Analysis
-
max time kernel
160s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:49
Static task
static1
Behavioral task
behavioral1
Sample
d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a.exe
Resource
win7-20220901-en
General
-
Target
d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a.exe
-
Size
287KB
-
MD5
61fc10b4f89247874d8ee2373902d664
-
SHA1
86b954b7edfc432d06db5033fe2a06550d97210c
-
SHA256
d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a
-
SHA512
4f04f40acdca75ed98aad8d6f99f7ab054e0f40939270d9a86ae3cd9a2ce338f2f369cd1357ecfb14c1661ef8f552886e34dde7bc88eb44c7b9aa5fe4727fd4f
-
SSDEEP
6144:fCuHMP9uu6r2VVrobWFe6FNHTock6nE5fflpYBjONFaJMDtCsAJLIB:KGMFuuw2VVrsWnHscqnULIB
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5060-132-0x0000000010000000-0x0000000010031000-memory.dmp family_gh0strat behavioral2/memory/3756-138-0x0000000010000000-0x0000000010031000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
Processes:
gyuuyg.exepid process 3756 gyuuyg.exe -
Drops file in Windows directory 2 IoCs
Processes:
d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a.exedescription ioc process File created C:\Windows\gyuuyg.exe d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a.exe File opened for modification C:\Windows\gyuuyg.exe d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a.exedescription pid process Token: SeIncBasePriorityPrivilege 5060 d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a.exe"C:\Users\Admin\AppData\Local\Temp\d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
C:\Windows\gyuuyg.exeC:\Windows\gyuuyg.exe1⤵
- Executes dropped EXE
PID:3756
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
287KB
MD561fc10b4f89247874d8ee2373902d664
SHA186b954b7edfc432d06db5033fe2a06550d97210c
SHA256d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a
SHA5124f04f40acdca75ed98aad8d6f99f7ab054e0f40939270d9a86ae3cd9a2ce338f2f369cd1357ecfb14c1661ef8f552886e34dde7bc88eb44c7b9aa5fe4727fd4f
-
Filesize
287KB
MD561fc10b4f89247874d8ee2373902d664
SHA186b954b7edfc432d06db5033fe2a06550d97210c
SHA256d47284aa7e30f989ba3a43e9d52efd87dd2eb1197e8c49d92261a43d2e5a453a
SHA5124f04f40acdca75ed98aad8d6f99f7ab054e0f40939270d9a86ae3cd9a2ce338f2f369cd1357ecfb14c1661ef8f552886e34dde7bc88eb44c7b9aa5fe4727fd4f