Analysis
-
max time kernel
77s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
eee.exe
Resource
win7-20220901-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
eee.exe
Resource
win10v2004-20220812-en
9 signatures
150 seconds
General
-
Target
eee.exe
-
Size
106KB
-
MD5
f485d7fa5edbc8a557e12d807970a7aa
-
SHA1
b8f875b9108e3bf7e2e0c2ee27a31be263e8bbee
-
SHA256
e1322860ef00c8a03bfd14d8a7fa17baebb77ace4a53fee1ee96cdc9d721153a
-
SHA512
a2d6cb28ca854e93b4d10919fc9b74838b78f0fb4d70e3c969d08a14d156a59708d23cab8615eea4f176d0fd79ca462361b703e93aaa6ed51d62f1dd8dae7340
-
SSDEEP
3072:CFFil+VFbe1N9JJuusBBlMPmuf6znw9rzy0SwXozZ:C6m4N9JJzqyyLXtyozZ
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3096-135-0x0000000010000000-0x0000000010050000-memory.dmp family_gh0strat behavioral2/memory/3096-136-0x0000000010000000-0x0000000010050000-memory.dmp family_gh0strat behavioral2/memory/3096-134-0x0000000010000000-0x0000000010050000-memory.dmp family_gh0strat behavioral2/memory/3096-139-0x0000000010000000-0x0000000010050000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run eee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\E638AC71 = "C:\\Windows\\E638AC71\\svchsot.exe" eee.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default eee.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\E638AC71\svchsot.exe eee.exe File opened for modification C:\Windows\E638AC71\svchsot.exe eee.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3096 eee.exe 3096 eee.exe 3096 eee.exe 3096 eee.exe 3096 eee.exe 3096 eee.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3096 eee.exe Token: SeDebugPrivilege 3096 eee.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3096 wrote to memory of 4636 3096 eee.exe 79 PID 3096 wrote to memory of 4636 3096 eee.exe 79 PID 3096 wrote to memory of 4636 3096 eee.exe 79 PID 4636 wrote to memory of 4584 4636 net.exe 81 PID 4636 wrote to memory of 4584 4636 net.exe 81 PID 4636 wrote to memory of 4584 4636 net.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\eee.exe"C:\Users\Admin\AppData\Local\Temp\eee.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:4584
-
-