Analysis
-
max time kernel
149s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 08:02
Static task
static1
Behavioral task
behavioral1
Sample
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe
Resource
win7-20220812-en
General
-
Target
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe
-
Size
252KB
-
MD5
eb1d4a1b9a94f36a4a90c4ffbe33ea14
-
SHA1
71163ea884aced730b626454f1de9b1fbc258422
-
SHA256
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c
-
SHA512
8fdfb864e0fb68434a196edea440db5ebd983de9ac40fb2933cdbb9933ea641df0ffbe1497d966e9b2faf6f6b00792404179a6a00b29fb1ae7eb18366a989ecc
-
SSDEEP
3072:PfvUpXXkVMO4gCwd3E5y1mZCGbvKa2x719Iy/jvuyttPlLcHUdPt1Xs:XvUpHu4gvqQ1QKPyIjftxdkUdz
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1448-55-0x0000000010000000-0x0000000010016000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
Processes:
vgtdcg.exepid process 2012 vgtdcg.exe -
Deletes itself 1 IoCs
Processes:
WScript.exepid process 1480 WScript.exe -
Drops file in Windows directory 2 IoCs
Processes:
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exedescription ioc process File opened for modification C:\Windows\vgtdcg.exe 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe File created C:\Windows\vgtdcg.exe 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exevgtdcg.exepid process 1448 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe 2012 vgtdcg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exedescription pid process target process PID 1448 wrote to memory of 1480 1448 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe WScript.exe PID 1448 wrote to memory of 1480 1448 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe WScript.exe PID 1448 wrote to memory of 1480 1448 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe WScript.exe PID 1448 wrote to memory of 1480 1448 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe"C:\Users\Admin\AppData\Local\Temp\77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\4059.vbs"2⤵
- Deletes itself
PID:1480
-
C:\Windows\vgtdcg.exeC:\Windows\vgtdcg.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD57eae53eedb1d0668d16490cde68ced19
SHA16f5ba565a182633262e2c5d3189806bed157f69f
SHA256038f7be8e85825ca8a0d8dbde420e893f095deededf4043479a5940a136901aa
SHA512a81b4dfc12a622f27661d186327270dd2beec174e76896067c4fdd2d94cbba5ec7a8f5382ccbe7e8d2244f66ab1de96e0166bee22686ed954c2cf1e0494656bb
-
Filesize
252KB
MD5eb1d4a1b9a94f36a4a90c4ffbe33ea14
SHA171163ea884aced730b626454f1de9b1fbc258422
SHA25677410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c
SHA5128fdfb864e0fb68434a196edea440db5ebd983de9ac40fb2933cdbb9933ea641df0ffbe1497d966e9b2faf6f6b00792404179a6a00b29fb1ae7eb18366a989ecc
-
Filesize
252KB
MD5eb1d4a1b9a94f36a4a90c4ffbe33ea14
SHA171163ea884aced730b626454f1de9b1fbc258422
SHA25677410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c
SHA5128fdfb864e0fb68434a196edea440db5ebd983de9ac40fb2933cdbb9933ea641df0ffbe1497d966e9b2faf6f6b00792404179a6a00b29fb1ae7eb18366a989ecc