Overview
overview
10Static
static
8LetGo.exe
windows7-x64
6LetGo.exe
windows10-2004-x64
10NewRat.exe
windows7-x64
1NewRat.exe
windows10-2004-x64
1WEBserver.exe
windows7-x64
10WEBserver.exe
windows10-2004-x64
10g.exe
windows7-x64
1g.exe
windows10-2004-x64
1smss.exe
windows7-x64
1smss.exe
windows10-2004-x64
1svshost.exe
windows7-x64
10svshost.exe
windows10-2004-x64
10Analysis
-
max time kernel
182s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 02:01
Behavioral task
behavioral1
Sample
LetGo.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
LetGo.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
NewRat.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
NewRat.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
WEBserver.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
WEBserver.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
g.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
g.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
smss.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
smss.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
svshost.exe
Resource
win7-20220812-en
General
-
Target
WEBserver.exe
-
Size
89KB
-
MD5
b89be3ac06d28a1d04b2b5b080db77b3
-
SHA1
7d40d6884ac368d47af53c6f3a545b83c3f61d6e
-
SHA256
85c95670c06936b8750bed1815715b4b42e797537a2ed1e1dd0cac881b79f1fb
-
SHA512
d679ae6c2fef72cde43fafa6c35cfc787a541dbf82c194314246067653023de2a2e1325ba6d13610866a84c9f51983173bdd7cfbb2785a2c02adbb8f7dd4f5ae
-
SSDEEP
1536:SdUVasm9gAHGsOqujkQINbte1EGZpqX5+Ic4FP9MsJLyqTOtEP0Boma1oHXDzt5a:S2gsmbHGhqCkQINRiUsIPZLJh90vbXDS
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral6/memory/1440-134-0x0000000010000000-0x0000000010036000-memory.dmp family_gh0strat behavioral6/memory/1440-135-0x0000000010000000-0x0000000010036000-memory.dmp family_gh0strat behavioral6/memory/1440-136-0x0000000010000000-0x0000000010036000-memory.dmp family_gh0strat behavioral6/memory/1924-142-0x0000000010000000-0x0000000010036000-memory.dmp family_gh0strat behavioral6/memory/1924-141-0x0000000010000000-0x0000000010036000-memory.dmp family_gh0strat behavioral6/memory/1924-143-0x0000000010000000-0x0000000010036000-memory.dmp family_gh0strat behavioral6/memory/1924-144-0x0000000010000000-0x0000000010036000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1924 xcvzci.exe -
resource yara_rule behavioral6/memory/1440-132-0x0000000010000000-0x0000000010036000-memory.dmp upx behavioral6/memory/1440-134-0x0000000010000000-0x0000000010036000-memory.dmp upx behavioral6/memory/1440-135-0x0000000010000000-0x0000000010036000-memory.dmp upx behavioral6/memory/1440-136-0x0000000010000000-0x0000000010036000-memory.dmp upx behavioral6/memory/1924-139-0x0000000010000000-0x0000000010036000-memory.dmp upx behavioral6/memory/1924-142-0x0000000010000000-0x0000000010036000-memory.dmp upx behavioral6/memory/1924-141-0x0000000010000000-0x0000000010036000-memory.dmp upx behavioral6/memory/1924-143-0x0000000010000000-0x0000000010036000-memory.dmp upx behavioral6/memory/1924-144-0x0000000010000000-0x0000000010036000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xcvzci.exe WEBserver.exe File opened for modification C:\Windows\xcvzci.exe WEBserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1924 xcvzci.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1440 WEBserver.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WEBserver.exe"C:\Users\Admin\AppData\Local\Temp\WEBserver.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
C:\Windows\xcvzci.exeC:\Windows\xcvzci.exe1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1924
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5b89be3ac06d28a1d04b2b5b080db77b3
SHA17d40d6884ac368d47af53c6f3a545b83c3f61d6e
SHA25685c95670c06936b8750bed1815715b4b42e797537a2ed1e1dd0cac881b79f1fb
SHA512d679ae6c2fef72cde43fafa6c35cfc787a541dbf82c194314246067653023de2a2e1325ba6d13610866a84c9f51983173bdd7cfbb2785a2c02adbb8f7dd4f5ae
-
Filesize
89KB
MD5b89be3ac06d28a1d04b2b5b080db77b3
SHA17d40d6884ac368d47af53c6f3a545b83c3f61d6e
SHA25685c95670c06936b8750bed1815715b4b42e797537a2ed1e1dd0cac881b79f1fb
SHA512d679ae6c2fef72cde43fafa6c35cfc787a541dbf82c194314246067653023de2a2e1325ba6d13610866a84c9f51983173bdd7cfbb2785a2c02adbb8f7dd4f5ae