Analysis
-
max time kernel
245s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe
Resource
win10v2004-20221111-en
General
-
Target
18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe
-
Size
80KB
-
MD5
1e127144782bdc5dc35b52d8bc1f0662
-
SHA1
d30a1e183e02d1927de38e313dc67a82201e05a8
-
SHA256
18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029
-
SHA512
454c48cd2375132a742936428c02ed362dcfe981da5eaabd449fa1635bbe49b3717e6cb64d631bffe4657813e06b44af6473def01bee8bba74a9e37d617a10ee
-
SSDEEP
1536:sFz0LnC0atiq+9Cc73McaTBFb0bJ+oa/xrpnHTlyojsjxNe22JjIHM:sFz90hq+Yc7Hf4oa5r5sojsj+oM
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/540-57-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral1/memory/540-61-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\26178598 = "C:\\Windows\\26178598\\svchsot.exe" 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\26178598\svchsot.exe 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe File opened for modification C:\Windows\26178598\svchsot.exe 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 540 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 540 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 540 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 540 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 540 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe Token: SeDebugPrivilege 540 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 540 wrote to memory of 1480 540 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 28 PID 540 wrote to memory of 1480 540 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 28 PID 540 wrote to memory of 1480 540 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 28 PID 540 wrote to memory of 1480 540 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 28 PID 1480 wrote to memory of 1304 1480 net.exe 30 PID 1480 wrote to memory of 1304 1480 net.exe 30 PID 1480 wrote to memory of 1304 1480 net.exe 30 PID 1480 wrote to memory of 1304 1480 net.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe"C:\Users\Admin\AppData\Local\Temp\18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:1304
-
-