Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 02:24
Static task
static1
Behavioral task
behavioral1
Sample
385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe
Resource
win10v2004-20220812-en
General
-
Target
385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe
-
Size
356KB
-
MD5
228b747f695c1527c16cc6313176e4d7
-
SHA1
808e16063aad430d5bb488f5f302f13066a08512
-
SHA256
385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe
-
SHA512
3f104508f6098c3efeef76cda8a25b527f93b9fe5d1b7ca5d40f7ca02f89140cc3f9e1a0185d4170d7031788f6fe4d05d6fb2bc1aac83aa32b84a25dd4402f00
-
SSDEEP
6144:UtMMmwzlqUHoeWofjjpAViY/lH6h+Evtz6UjHunTk/FoFi4mSk+4zKjLJsD4QH:3epqEojofjdAVikV6QcGkNezmSdfiss
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/636-139-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/636-140-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/636-142-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000022e1b-133.dat acprotect behavioral2/files/0x0008000000022e1b-134.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX6EFBF310 = "C:\\Windows\\XXXXXX6EFBF310\\svchsot.exe" 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\XXXXXX6EFBF310\svchsot.exe 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe File opened for modification C:\Windows\XXXXXX6EFBF310\svchsot.exe 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe File created C:\Windows\XXXXXX6EFBF310\JH.BAT 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4920 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 636 wrote to memory of 4944 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 79 PID 636 wrote to memory of 4944 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 79 PID 636 wrote to memory of 4944 636 385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe 79 PID 4944 wrote to memory of 4912 4944 cmd.exe 81 PID 4944 wrote to memory of 4912 4944 cmd.exe 81 PID 4944 wrote to memory of 4912 4944 cmd.exe 81 PID 4944 wrote to memory of 4920 4944 cmd.exe 82 PID 4944 wrote to memory of 4920 4944 cmd.exe 82 PID 4944 wrote to memory of 4920 4944 cmd.exe 82 PID 4944 wrote to memory of 5000 4944 cmd.exe 83 PID 4944 wrote to memory of 5000 4944 cmd.exe 83 PID 4944 wrote to memory of 5000 4944 cmd.exe 83 PID 5000 wrote to memory of 1436 5000 net.exe 84 PID 5000 wrote to memory of 1436 5000 net.exe 84 PID 5000 wrote to memory of 1436 5000 net.exe 84 PID 4944 wrote to memory of 1432 4944 cmd.exe 85 PID 4944 wrote to memory of 1432 4944 cmd.exe 85 PID 4944 wrote to memory of 1432 4944 cmd.exe 85 PID 4944 wrote to memory of 3596 4944 cmd.exe 86 PID 4944 wrote to memory of 3596 4944 cmd.exe 86 PID 4944 wrote to memory of 3596 4944 cmd.exe 86 PID 4944 wrote to memory of 2204 4944 cmd.exe 87 PID 4944 wrote to memory of 2204 4944 cmd.exe 87 PID 4944 wrote to memory of 2204 4944 cmd.exe 87 PID 4944 wrote to memory of 2012 4944 cmd.exe 88 PID 4944 wrote to memory of 2012 4944 cmd.exe 88 PID 4944 wrote to memory of 2012 4944 cmd.exe 88 PID 4944 wrote to memory of 2040 4944 cmd.exe 89 PID 4944 wrote to memory of 2040 4944 cmd.exe 89 PID 4944 wrote to memory of 2040 4944 cmd.exe 89 PID 4944 wrote to memory of 3952 4944 cmd.exe 90 PID 4944 wrote to memory of 3952 4944 cmd.exe 90 PID 4944 wrote to memory of 3952 4944 cmd.exe 90 PID 4944 wrote to memory of 3692 4944 cmd.exe 91 PID 4944 wrote to memory of 3692 4944 cmd.exe 91 PID 4944 wrote to memory of 3692 4944 cmd.exe 91 PID 4944 wrote to memory of 2544 4944 cmd.exe 92 PID 4944 wrote to memory of 2544 4944 cmd.exe 92 PID 4944 wrote to memory of 2544 4944 cmd.exe 92 PID 4944 wrote to memory of 2784 4944 cmd.exe 93 PID 4944 wrote to memory of 2784 4944 cmd.exe 93 PID 4944 wrote to memory of 2784 4944 cmd.exe 93 PID 4944 wrote to memory of 4716 4944 cmd.exe 94 PID 4944 wrote to memory of 4716 4944 cmd.exe 94 PID 4944 wrote to memory of 4716 4944 cmd.exe 94 PID 4944 wrote to memory of 408 4944 cmd.exe 95 PID 4944 wrote to memory of 408 4944 cmd.exe 95 PID 4944 wrote to memory of 408 4944 cmd.exe 95 PID 4944 wrote to memory of 4040 4944 cmd.exe 96 PID 4944 wrote to memory of 4040 4944 cmd.exe 96 PID 4944 wrote to memory of 4040 4944 cmd.exe 96 PID 4944 wrote to memory of 2472 4944 cmd.exe 97 PID 4944 wrote to memory of 2472 4944 cmd.exe 97 PID 4944 wrote to memory of 2472 4944 cmd.exe 97 PID 4944 wrote to memory of 4088 4944 cmd.exe 98 PID 4944 wrote to memory of 4088 4944 cmd.exe 98 PID 4944 wrote to memory of 4088 4944 cmd.exe 98 PID 4944 wrote to memory of 1708 4944 cmd.exe 99 PID 4944 wrote to memory of 1708 4944 cmd.exe 99 PID 4944 wrote to memory of 1708 4944 cmd.exe 99 PID 4944 wrote to memory of 404 4944 cmd.exe 100 PID 4944 wrote to memory of 404 4944 cmd.exe 100 PID 4944 wrote to memory of 404 4944 cmd.exe 100 PID 4944 wrote to memory of 4828 4944 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe"C:\Users\Admin\AppData\Local\Temp\385753c8ce17178b6daaccf094b43c64ea9c2e9e8370e31adc337f0916380afe.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\XXXXXX6EFBF310\JH.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵PID:4912
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
PID:4920
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵PID:1436
-
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1432
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:3596
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:2204
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:2012
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:2040
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:3952
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:3692
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:2544
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:2784
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:4716
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:408
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:4040
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:2472
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:4088
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1708
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:404
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:4828
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:4104
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:2304
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:4048
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:2092
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:2636
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:488
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:1408
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXX6EFBF310\svchsot.exe3⤵PID:4124
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
1KB
MD584499ce5c7c9c4a4b5b6cd09cd2629e0
SHA1e0575d47f04ca918ddee7ad58ddd6fdb7937472c
SHA256275af4cd6b474560e2fe5890f3e0979bc572990e098059449198626e1f305803
SHA5120742f1086606535905a6041b5629d44a4f8d72188b5700633d6e0625d8612e04202fd90a236687bd172dae26ce63cc05213b71076ea6e39faea6b92e74c3f0d5