Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 12:36
Static task
static1
Behavioral task
behavioral1
Sample
7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe
Resource
win10v2004-20220812-en
General
-
Target
7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe
-
Size
80KB
-
MD5
1a332bb6d26a8dcdefa651ef4b66d3b1
-
SHA1
a9a03286cc95ef31911c3e38bfddb5880af30e48
-
SHA256
7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941
-
SHA512
10a394c176077e44dd1838b2abb3c1ce7315b62d23ec34ea845f34e8955e11dd17d6b17f7d4e9fa14adb1ccba8a994441649080719d6950b33fbc89859ea3822
-
SSDEEP
1536:kFz0LnC0atiq+9Cc73McaTBFb0bJ+oa/xrpnHTlyojsjxNe22JjIHME:kFz90hq+Yc7Hf4oa5r5sojsj+oME
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1192-134-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/1192-135-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/1192-136-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/1192-139-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\0DBB1869 = "C:\\Windows\\0DBB1869\\svchsot.exe" 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe -
Drops file in System32 directory 1 IoCs
Processes:
7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Default 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exepid process 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exepid process 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exedescription pid process Token: SeDebugPrivilege 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exenet.exedescription pid process target process PID 1192 wrote to memory of 1572 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe net.exe PID 1192 wrote to memory of 1572 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe net.exe PID 1192 wrote to memory of 1572 1192 7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe net.exe PID 1572 wrote to memory of 2808 1572 net.exe net1.exe PID 1572 wrote to memory of 2808 1572 net.exe net1.exe PID 1572 wrote to memory of 2808 1572 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe"C:\Users\Admin\AppData\Local\Temp\7d00199ab6a68c594a586c5e0a0d6bb7d19c1a46c10fcd6ded1d8a75906b8941.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:2808