Analysis
-
max time kernel
151s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 08:02
Static task
static1
Behavioral task
behavioral1
Sample
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe
Resource
win7-20220812-en
General
-
Target
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe
-
Size
252KB
-
MD5
eb1d4a1b9a94f36a4a90c4ffbe33ea14
-
SHA1
71163ea884aced730b626454f1de9b1fbc258422
-
SHA256
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c
-
SHA512
8fdfb864e0fb68434a196edea440db5ebd983de9ac40fb2933cdbb9933ea641df0ffbe1497d966e9b2faf6f6b00792404179a6a00b29fb1ae7eb18366a989ecc
-
SSDEEP
3072:PfvUpXXkVMO4gCwd3E5y1mZCGbvKa2x719Iy/jvuyttPlLcHUdPt1Xs:XvUpHu4gvqQ1QKPyIjftxdkUdz
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1956-132-0x0000000010000000-0x0000000010016000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
Processes:
xcvzci.exepid process 1984 xcvzci.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe -
Drops file in Windows directory 2 IoCs
Processes:
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exedescription ioc process File created C:\Windows\xcvzci.exe 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe File opened for modification C:\Windows\xcvzci.exe 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exexcvzci.exepid process 1956 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe 1956 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe 1984 xcvzci.exe 1984 xcvzci.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exedescription pid process target process PID 1956 wrote to memory of 4080 1956 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe WScript.exe PID 1956 wrote to memory of 4080 1956 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe WScript.exe PID 1956 wrote to memory of 4080 1956 77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe"C:\Users\Admin\AppData\Local\Temp\77410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\4297.vbs"2⤵PID:4080
-
C:\Windows\xcvzci.exeC:\Windows\xcvzci.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD57eae53eedb1d0668d16490cde68ced19
SHA16f5ba565a182633262e2c5d3189806bed157f69f
SHA256038f7be8e85825ca8a0d8dbde420e893f095deededf4043479a5940a136901aa
SHA512a81b4dfc12a622f27661d186327270dd2beec174e76896067c4fdd2d94cbba5ec7a8f5382ccbe7e8d2244f66ab1de96e0166bee22686ed954c2cf1e0494656bb
-
Filesize
252KB
MD5eb1d4a1b9a94f36a4a90c4ffbe33ea14
SHA171163ea884aced730b626454f1de9b1fbc258422
SHA25677410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c
SHA5128fdfb864e0fb68434a196edea440db5ebd983de9ac40fb2933cdbb9933ea641df0ffbe1497d966e9b2faf6f6b00792404179a6a00b29fb1ae7eb18366a989ecc
-
Filesize
252KB
MD5eb1d4a1b9a94f36a4a90c4ffbe33ea14
SHA171163ea884aced730b626454f1de9b1fbc258422
SHA25677410c380365854826de27a653bbdb921b4b6b7343e41fad74c8c1ec102d122c
SHA5128fdfb864e0fb68434a196edea440db5ebd983de9ac40fb2933cdbb9933ea641df0ffbe1497d966e9b2faf6f6b00792404179a6a00b29fb1ae7eb18366a989ecc