Overview
overview
10Static
static
8LetGo.exe
windows7-x64
6LetGo.exe
windows10-2004-x64
10NewRat.exe
windows7-x64
1NewRat.exe
windows10-2004-x64
1WEBserver.exe
windows7-x64
10WEBserver.exe
windows10-2004-x64
10g.exe
windows7-x64
1g.exe
windows10-2004-x64
1smss.exe
windows7-x64
1smss.exe
windows10-2004-x64
1svshost.exe
windows7-x64
10svshost.exe
windows10-2004-x64
10Analysis
-
max time kernel
176s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 02:01
Behavioral task
behavioral1
Sample
LetGo.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
LetGo.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
NewRat.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
NewRat.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
WEBserver.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
WEBserver.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
g.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
g.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
smss.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
smss.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
svshost.exe
Resource
win7-20220812-en
General
-
Target
LetGo.exe
-
Size
100KB
-
MD5
66f5b672d1c27615ccf5644f53b3200a
-
SHA1
77d4f6ea42a4e7c3f3d2b9eaf19b12ed658742a2
-
SHA256
87142a78a463945d210e10c733b90adfc0ca29b60e81af8d1debf2fd3ae1a4fe
-
SHA512
59b0a184c97f463e45345d6e1637fa15c35fc78438afb48830d85936a74414d6ebe140c644533e62aa564a8e34a3f88db2c2ef19301d846b9b443aaf29c536f3
-
SSDEEP
1536:UZFAbI7TdP7aQTssv2qf+8Dk2/qiUDtfXo3KZl7QKM90/T1Msid9Tb9NwidME:UAQR7cR8D9/ADtfXoqlk9kZtidfuU
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List LetGo.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile LetGo.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications LetGo.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\LetGo.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\LetGo.exe:*:enabled:@shell32.dll,-1" LetGo.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run LetGo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xiaoqinyk.ddns.net = "C:\\Users\\Admin\\AppData\\Local\\Temp\\LetGo.exe" LetGo.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 LetGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz LetGo.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 516 LetGo.exe 516 LetGo.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe 516 LetGo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 516 LetGo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 516 wrote to memory of 588 516 LetGo.exe 6 PID 516 wrote to memory of 588 516 LetGo.exe 6 PID 516 wrote to memory of 588 516 LetGo.exe 6 PID 516 wrote to memory of 588 516 LetGo.exe 6 PID 516 wrote to memory of 588 516 LetGo.exe 6 PID 516 wrote to memory of 588 516 LetGo.exe 6 PID 516 wrote to memory of 664 516 LetGo.exe 4 PID 516 wrote to memory of 664 516 LetGo.exe 4 PID 516 wrote to memory of 664 516 LetGo.exe 4 PID 516 wrote to memory of 664 516 LetGo.exe 4 PID 516 wrote to memory of 664 516 LetGo.exe 4 PID 516 wrote to memory of 664 516 LetGo.exe 4 PID 516 wrote to memory of 776 516 LetGo.exe 8 PID 516 wrote to memory of 776 516 LetGo.exe 8 PID 516 wrote to memory of 776 516 LetGo.exe 8 PID 516 wrote to memory of 776 516 LetGo.exe 8 PID 516 wrote to memory of 776 516 LetGo.exe 8 PID 516 wrote to memory of 776 516 LetGo.exe 8 PID 516 wrote to memory of 784 516 LetGo.exe 19 PID 516 wrote to memory of 784 516 LetGo.exe 19 PID 516 wrote to memory of 784 516 LetGo.exe 19 PID 516 wrote to memory of 784 516 LetGo.exe 19 PID 516 wrote to memory of 784 516 LetGo.exe 19 PID 516 wrote to memory of 784 516 LetGo.exe 19 PID 516 wrote to memory of 792 516 LetGo.exe 18 PID 516 wrote to memory of 792 516 LetGo.exe 18 PID 516 wrote to memory of 792 516 LetGo.exe 18 PID 516 wrote to memory of 792 516 LetGo.exe 18 PID 516 wrote to memory of 792 516 LetGo.exe 18 PID 516 wrote to memory of 792 516 LetGo.exe 18 PID 516 wrote to memory of 900 516 LetGo.exe 16 PID 516 wrote to memory of 900 516 LetGo.exe 16 PID 516 wrote to memory of 900 516 LetGo.exe 16 PID 516 wrote to memory of 900 516 LetGo.exe 16 PID 516 wrote to memory of 900 516 LetGo.exe 16 PID 516 wrote to memory of 900 516 LetGo.exe 16 PID 516 wrote to memory of 952 516 LetGo.exe 15 PID 516 wrote to memory of 952 516 LetGo.exe 15 PID 516 wrote to memory of 952 516 LetGo.exe 15 PID 516 wrote to memory of 952 516 LetGo.exe 15 PID 516 wrote to memory of 952 516 LetGo.exe 15 PID 516 wrote to memory of 952 516 LetGo.exe 15 PID 516 wrote to memory of 60 516 LetGo.exe 9 PID 516 wrote to memory of 60 516 LetGo.exe 9 PID 516 wrote to memory of 60 516 LetGo.exe 9 PID 516 wrote to memory of 60 516 LetGo.exe 9 PID 516 wrote to memory of 60 516 LetGo.exe 9 PID 516 wrote to memory of 60 516 LetGo.exe 9 PID 516 wrote to memory of 444 516 LetGo.exe 13 PID 516 wrote to memory of 444 516 LetGo.exe 13 PID 516 wrote to memory of 444 516 LetGo.exe 13 PID 516 wrote to memory of 444 516 LetGo.exe 13 PID 516 wrote to memory of 444 516 LetGo.exe 13 PID 516 wrote to memory of 444 516 LetGo.exe 13 PID 516 wrote to memory of 696 516 LetGo.exe 10 PID 516 wrote to memory of 696 516 LetGo.exe 10 PID 516 wrote to memory of 696 516 LetGo.exe 10 PID 516 wrote to memory of 696 516 LetGo.exe 10 PID 516 wrote to memory of 696 516 LetGo.exe 10 PID 516 wrote to memory of 696 516 LetGo.exe 10 PID 516 wrote to memory of 916 516 LetGo.exe 11 PID 516 wrote to memory of 916 516 LetGo.exe 11 PID 516 wrote to memory of 916 516 LetGo.exe 11 PID 516 wrote to memory of 916 516 LetGo.exe 11
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:664
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:588
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:784
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1120
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2852
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:792
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1800
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:5100
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:4700
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:3384
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:5008
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3996
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3724
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3512
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3428
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3360
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3252
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1168
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1324
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2716
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1576
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:3832
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:4980
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:2540
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:5092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:428
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\LetGo.exe"C:\Users\Admin\AppData\Local\Temp\LetGo.exe"2⤵
- Modifies firewall policy service
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:516
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2504
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2412
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2308
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2148
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:1716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:1688
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1056
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1972
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1892
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1792
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1664
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1636