Analysis
-
max time kernel
144s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 02:24
Static task
static1
Behavioral task
behavioral1
Sample
385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe
Resource
win10v2004-20220812-en
General
-
Target
385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe
-
Size
356KB
-
MD5
228b747f695c1527c16cc6313176e4d7
-
SHA1
808e16063aad430d5bb488f5f302f13066a08512
-
SHA256
385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe
-
SHA512
3f104508f6098c3efeef76cda8a25b527f93b9fe5d1b7ca5d40f7ca02f89140cc3f9e1a0185d4170d7031788f6fe4d05d6fb2bc1aac83aa32b84a25dd4402f00
-
SSDEEP
6144:UtMMmwzlqUHoeWofjjpAViY/lH6h+Evtz6UjHunTk/FoFi4mSk+4zKjLJsD4QH:3epqEojofjdAVikV6QcGkNezmSdfiss
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1212-58-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/1212-65-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000c0000000054a8-54.dat acprotect behavioral1/files/0x000c0000000054a8-67.dat acprotect behavioral1/files/0x000c0000000054a8-68.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 1212 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 1508 schtasks.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX6EFBF310 = "C:\\Windows\\XXXXXX6EFBF310\\svchsot.exe" 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\XXXXXX6EFBF310\svchsot.exe 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe File opened for modification C:\Windows\XXXXXX6EFBF310\svchsot.exe 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe File created C:\Windows\XXXXXX6EFBF310\JH.BAT 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2028 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1212 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 1212 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 1212 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 1212 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1212 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1524 1212 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 27 PID 1212 wrote to memory of 1524 1212 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 27 PID 1212 wrote to memory of 1524 1212 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 27 PID 1212 wrote to memory of 1524 1212 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 27 PID 1524 wrote to memory of 1508 1524 cmd.exe 29 PID 1524 wrote to memory of 1508 1524 cmd.exe 29 PID 1524 wrote to memory of 1508 1524 cmd.exe 29 PID 1524 wrote to memory of 1508 1524 cmd.exe 29 PID 1524 wrote to memory of 2028 1524 cmd.exe 30 PID 1524 wrote to memory of 2028 1524 cmd.exe 30 PID 1524 wrote to memory of 2028 1524 cmd.exe 30 PID 1524 wrote to memory of 2028 1524 cmd.exe 30 PID 1524 wrote to memory of 1960 1524 cmd.exe 31 PID 1524 wrote to memory of 1960 1524 cmd.exe 31 PID 1524 wrote to memory of 1960 1524 cmd.exe 31 PID 1524 wrote to memory of 1960 1524 cmd.exe 31 PID 1960 wrote to memory of 1976 1960 net.exe 32 PID 1960 wrote to memory of 1976 1960 net.exe 32 PID 1960 wrote to memory of 1976 1960 net.exe 32 PID 1960 wrote to memory of 1976 1960 net.exe 32 PID 1524 wrote to memory of 1692 1524 cmd.exe 33 PID 1524 wrote to memory of 1692 1524 cmd.exe 33 PID 1524 wrote to memory of 1692 1524 cmd.exe 33 PID 1524 wrote to memory of 1692 1524 cmd.exe 33 PID 1524 wrote to memory of 1688 1524 cmd.exe 34 PID 1524 wrote to memory of 1688 1524 cmd.exe 34 PID 1524 wrote to memory of 1688 1524 cmd.exe 34 PID 1524 wrote to memory of 1688 1524 cmd.exe 34 PID 1524 wrote to memory of 1132 1524 cmd.exe 35 PID 1524 wrote to memory of 1132 1524 cmd.exe 35 PID 1524 wrote to memory of 1132 1524 cmd.exe 35 PID 1524 wrote to memory of 1132 1524 cmd.exe 35 PID 1524 wrote to memory of 708 1524 cmd.exe 36 PID 1524 wrote to memory of 708 1524 cmd.exe 36 PID 1524 wrote to memory of 708 1524 cmd.exe 36 PID 1524 wrote to memory of 708 1524 cmd.exe 36 PID 1524 wrote to memory of 964 1524 cmd.exe 37 PID 1524 wrote to memory of 964 1524 cmd.exe 37 PID 1524 wrote to memory of 964 1524 cmd.exe 37 PID 1524 wrote to memory of 964 1524 cmd.exe 37 PID 1524 wrote to memory of 1112 1524 cmd.exe 38 PID 1524 wrote to memory of 1112 1524 cmd.exe 38 PID 1524 wrote to memory of 1112 1524 cmd.exe 38 PID 1524 wrote to memory of 1112 1524 cmd.exe 38 PID 1524 wrote to memory of 780 1524 cmd.exe 39 PID 1524 wrote to memory of 780 1524 cmd.exe 39 PID 1524 wrote to memory of 780 1524 cmd.exe 39 PID 1524 wrote to memory of 780 1524 cmd.exe 39 PID 1524 wrote to memory of 1672 1524 cmd.exe 40 PID 1524 wrote to memory of 1672 1524 cmd.exe 40 PID 1524 wrote to memory of 1672 1524 cmd.exe 40 PID 1524 wrote to memory of 1672 1524 cmd.exe 40 PID 1524 wrote to memory of 672 1524 cmd.exe 41 PID 1524 wrote to memory of 672 1524 cmd.exe 41 PID 1524 wrote to memory of 672 1524 cmd.exe 41 PID 1524 wrote to memory of 672 1524 cmd.exe 41 PID 1524 wrote to memory of 612 1524 cmd.exe 42 PID 1524 wrote to memory of 612 1524 cmd.exe 42 PID 1524 wrote to memory of 612 1524 cmd.exe 42 PID 1524 wrote to memory of 612 1524 cmd.exe 42 PID 1524 wrote to memory of 640 1524 cmd.exe 43 PID 1524 wrote to memory of 640 1524 cmd.exe 43 PID 1524 wrote to memory of 640 1524 cmd.exe 43 PID 1524 wrote to memory of 640 1524 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe"C:\Users\Admin\AppData\Local\Temp\385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\XXXXXX6EFBF310\JH.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵
- Loads dropped DLL
PID:1508
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
PID:2028
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵PID:1976
-
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1692
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1688
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1132
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:708
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:964
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1112
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:780
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1672
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:672
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:612
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:640
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1148
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1236
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:848
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1048
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:700
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1928
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1412
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:904
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1980
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1640
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1912
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1144
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:976
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:872
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
1KB
MD584499ce5c7c9c4a4b5b6cd09cd2629e0
SHA1e0575d47f04ca918ddee7ad58ddd6fdb7937472c
SHA256275af4cd6b474560e2fe5890f3e0979bc572990e098059449198626e1f305803
SHA5120742f1086606535905a6041b5629d44a4f8d72188b5700633d6e0625d8612e04202fd90a236687bd172dae26ce63cc05213b71076ea6e39faea6b92e74c3f0d5
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9