Analysis
-
max time kernel
170s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe
Resource
win10v2004-20221111-en
General
-
Target
758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe
-
Size
94KB
-
MD5
13f7745e818e8a4aa4d39c85a86178e0
-
SHA1
937d96dc78b1627d22fe8467afda07df37dea000
-
SHA256
758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858
-
SHA512
8ef22b5c01dde77197df8e60cb5d8cb61f1a9da360cc37d64d71ab4f18b2b12c928d37ed05d069366072c750d6984cb4d180519e86fd667afbc57c21bd234435
-
SSDEEP
1536:9FQwQsiEoa2BhmUB4I+yuDg1uUO2mntP2qZNKHuNMaSJETxmIGykRZhcMePmrOa:9FQwQhEOLfuDg0PtOqzKONqsEykRLSeP
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/4344-135-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/4344-134-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/4344-137-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat -
resource yara_rule behavioral2/memory/4344-132-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/4344-135-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/4344-134-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/4344-137-0x0000000010000000-0x000000001003B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\B117762D = "C:\\Windows\\B117762D\\svchsot.exe" 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\B117762D\svchsot.exe 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe File opened for modification C:\Windows\B117762D\svchsot.exe 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3080 4344 WerFault.exe 13 4520 4344 WerFault.exe 13 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4344 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe 4344 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe 4344 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe 4344 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe 4344 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe 4344 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4344 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe Token: SeDebugPrivilege 4344 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4192 4344 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe 83 PID 4344 wrote to memory of 4192 4344 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe 83 PID 4344 wrote to memory of 4192 4344 758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe 83 PID 4192 wrote to memory of 220 4192 net.exe 85 PID 4192 wrote to memory of 220 4192 net.exe 85 PID 4192 wrote to memory of 220 4192 net.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe"C:\Users\Admin\AppData\Local\Temp\758f952f987e8652d06f5a2836a3df971e215d31859c6b4f9a33dcb4122e3858.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 6082⤵
- Program crash
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 7202⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 4344 -ip 43441⤵PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4344 -ip 43441⤵PID:3552