Overview
overview
10Static
static
8LetGo.exe
windows7-x64
6LetGo.exe
windows10-2004-x64
10NewRat.exe
windows7-x64
1NewRat.exe
windows10-2004-x64
1WEBserver.exe
windows7-x64
10WEBserver.exe
windows10-2004-x64
10g.exe
windows7-x64
1g.exe
windows10-2004-x64
1smss.exe
windows7-x64
1smss.exe
windows10-2004-x64
1svshost.exe
windows7-x64
10svshost.exe
windows10-2004-x64
10Analysis
-
max time kernel
209s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 02:01
Behavioral task
behavioral1
Sample
LetGo.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
LetGo.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
NewRat.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
NewRat.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
WEBserver.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
WEBserver.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
g.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
g.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
smss.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
smss.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
svshost.exe
Resource
win7-20220812-en
General
-
Target
svshost.exe
-
Size
174KB
-
MD5
322de9ce4eb1ba55c6be27bb61a801d7
-
SHA1
7648613ec0773056ac5af51c392cd63a77c0d6a5
-
SHA256
26b0300cec7f4598fda04ca3939981addd2ee4156f4b7a478a4fe4231d7fbec3
-
SHA512
6a1dec1d114ac9726c5caab429bee217b015f9a0f418a588567667c90267fe07869fd7efd01d9b76b07779732ce9f86f0e368619c3cffca7c29ecda030e23266
-
SSDEEP
3072:uCDSmJfdBv6/d5IBPBrzKx8UJEkIk6QwsgdUzMqIEtYKrTFY/LK7KL:uXmJkGBPK6UogZIEy+FY/9L
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral12/memory/2152-132-0x0000000010000000-0x0000000010032000-memory.dmp family_gh0strat behavioral12/memory/2180-138-0x0000000010000000-0x0000000010032000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2180 bgzdci.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation svshost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\bgzdci.exe svshost.exe File opened for modification C:\Windows\bgzdci.exe svshost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings svshost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1804 2152 svshost.exe 84 PID 2152 wrote to memory of 1804 2152 svshost.exe 84 PID 2152 wrote to memory of 1804 2152 svshost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\svshost.exe"C:\Users\Admin\AppData\Local\Temp\svshost.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\994.vbs"2⤵PID:1804
-
-
C:\Windows\bgzdci.exeC:\Windows\bgzdci.exe1⤵
- Executes dropped EXE
PID:2180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD58ba5e6242514f7583a88b9223a20fd0b
SHA13f70d559a7c80eba5137323419309db0190b49a1
SHA2566214f1e93874d897410e7e512647dbc27c49ebbf205955ee08a4ec7002dacdb3
SHA512049b055533ee93a3d707b189ea3f1125d0fb868f785329778e944d5c3a8d30ae9c0987eb3e6bc1a82d941a248c6bb0fb367616648b7a4b7f7696489f76d43dea
-
Filesize
174KB
MD5322de9ce4eb1ba55c6be27bb61a801d7
SHA17648613ec0773056ac5af51c392cd63a77c0d6a5
SHA25626b0300cec7f4598fda04ca3939981addd2ee4156f4b7a478a4fe4231d7fbec3
SHA5126a1dec1d114ac9726c5caab429bee217b015f9a0f418a588567667c90267fe07869fd7efd01d9b76b07779732ce9f86f0e368619c3cffca7c29ecda030e23266
-
Filesize
174KB
MD5322de9ce4eb1ba55c6be27bb61a801d7
SHA17648613ec0773056ac5af51c392cd63a77c0d6a5
SHA25626b0300cec7f4598fda04ca3939981addd2ee4156f4b7a478a4fe4231d7fbec3
SHA5126a1dec1d114ac9726c5caab429bee217b015f9a0f418a588567667c90267fe07869fd7efd01d9b76b07779732ce9f86f0e368619c3cffca7c29ecda030e23266