Analysis
-
max time kernel
163s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 11:12
Static task
static1
Behavioral task
behavioral1
Sample
18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe
Resource
win10v2004-20221111-en
General
-
Target
18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe
-
Size
80KB
-
MD5
1e127144782bdc5dc35b52d8bc1f0662
-
SHA1
d30a1e183e02d1927de38e313dc67a82201e05a8
-
SHA256
18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029
-
SHA512
454c48cd2375132a742936428c02ed362dcfe981da5eaabd449fa1635bbe49b3717e6cb64d631bffe4657813e06b44af6473def01bee8bba74a9e37d617a10ee
-
SSDEEP
1536:sFz0LnC0atiq+9Cc73McaTBFb0bJ+oa/xrpnHTlyojsjxNe22JjIHM:sFz90hq+Yc7Hf4oa5r5sojsj+oM
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/1240-134-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/1240-135-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/1240-136-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\26178598 = "C:\\Windows\\26178598\\svchsot.exe" 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\26178598\svchsot.exe 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe File opened for modification C:\Windows\26178598\svchsot.exe 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe Token: SeDebugPrivilege 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1240 wrote to memory of 4416 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 81 PID 1240 wrote to memory of 4416 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 81 PID 1240 wrote to memory of 4416 1240 18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe 81 PID 4416 wrote to memory of 364 4416 net.exe 83 PID 4416 wrote to memory of 364 4416 net.exe 83 PID 4416 wrote to memory of 364 4416 net.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe"C:\Users\Admin\AppData\Local\Temp\18d7921b96a2a301b2a7be56ed9d8a46eebe26efb808211592f208c512c3e029.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:364
-
-