Analysis
-
max time kernel
134s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe
Resource
win10v2004-20220812-en
General
-
Target
61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe
-
Size
235KB
-
MD5
3921ca628b5df93d7ce81cd0641710b9
-
SHA1
9b202dd88fe3d728983994813d2575ca631813b7
-
SHA256
61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b
-
SHA512
3dec5c0af5d1891af97f319187b3cd69d88abc1b9a17adbe83d1e5519867e052c2490f4e5209f491f91d928ef1ecd5eea2203522de1bb20ada039d4c5cd429d5
-
SSDEEP
6144:LiOdmVPmM46lcDoFlAUVtiawv/iQAQaytn86ZkRBowjXDKA:LiOd4cDoFltVfw3iRUrknowjTf
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000800000001230a-73.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 468 ki1B03D.tmp -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\UY3Oc1o6\Parameters\ServiceDll = "C:\\Windows\\system32\\6oVUDN.dll" ki1B03D.tmp -
Deletes itself 1 IoCs
pid Process 540 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 900 cmd.exe 900 cmd.exe 112 MsiExec.exe 112 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\6oVUDN.dll ki1B03D.tmp -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Win.ini ki1B03D.tmp File created C:\Windows\Installer\6e4c2e.msi msiexec.exe File opened for modification C:\Windows\Installer\6e4c2e.msi msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\Installer\MSI57F1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5997.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 468 ki1B03D.tmp 468 ki1B03D.tmp 468 ki1B03D.tmp 468 ki1B03D.tmp 468 ki1B03D.tmp 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 468 ki1B03D.tmp -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeBackupPrivilege 468 ki1B03D.tmp Token: SeRestorePrivilege 468 ki1B03D.tmp Token: SeShutdownPrivilege 1808 msiexec.exe Token: SeIncreaseQuotaPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 820 msiexec.exe Token: SeTakeOwnershipPrivilege 820 msiexec.exe Token: SeSecurityPrivilege 820 msiexec.exe Token: SeCreateTokenPrivilege 1808 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1808 msiexec.exe Token: SeLockMemoryPrivilege 1808 msiexec.exe Token: SeIncreaseQuotaPrivilege 1808 msiexec.exe Token: SeMachineAccountPrivilege 1808 msiexec.exe Token: SeTcbPrivilege 1808 msiexec.exe Token: SeSecurityPrivilege 1808 msiexec.exe Token: SeTakeOwnershipPrivilege 1808 msiexec.exe Token: SeLoadDriverPrivilege 1808 msiexec.exe Token: SeSystemProfilePrivilege 1808 msiexec.exe Token: SeSystemtimePrivilege 1808 msiexec.exe Token: SeProfSingleProcessPrivilege 1808 msiexec.exe Token: SeIncBasePriorityPrivilege 1808 msiexec.exe Token: SeCreatePagefilePrivilege 1808 msiexec.exe Token: SeCreatePermanentPrivilege 1808 msiexec.exe Token: SeBackupPrivilege 1808 msiexec.exe Token: SeRestorePrivilege 1808 msiexec.exe Token: SeShutdownPrivilege 1808 msiexec.exe Token: SeDebugPrivilege 1808 msiexec.exe Token: SeAuditPrivilege 1808 msiexec.exe Token: SeSystemEnvironmentPrivilege 1808 msiexec.exe Token: SeChangeNotifyPrivilege 1808 msiexec.exe Token: SeRemoteShutdownPrivilege 1808 msiexec.exe Token: SeUndockPrivilege 1808 msiexec.exe Token: SeSyncAgentPrivilege 1808 msiexec.exe Token: SeEnableDelegationPrivilege 1808 msiexec.exe Token: SeManageVolumePrivilege 1808 msiexec.exe Token: SeImpersonatePrivilege 1808 msiexec.exe Token: SeCreateGlobalPrivilege 1808 msiexec.exe Token: SeIncBasePriorityPrivilege 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe Token: SeRestorePrivilege 820 msiexec.exe Token: SeTakeOwnershipPrivilege 820 msiexec.exe Token: SeRestorePrivilege 820 msiexec.exe Token: SeTakeOwnershipPrivilege 820 msiexec.exe Token: SeRestorePrivilege 820 msiexec.exe Token: SeTakeOwnershipPrivilege 820 msiexec.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1812 wrote to memory of 900 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 28 PID 1812 wrote to memory of 900 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 28 PID 1812 wrote to memory of 900 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 28 PID 1812 wrote to memory of 900 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 28 PID 900 wrote to memory of 468 900 cmd.exe 30 PID 900 wrote to memory of 468 900 cmd.exe 30 PID 900 wrote to memory of 468 900 cmd.exe 30 PID 900 wrote to memory of 468 900 cmd.exe 30 PID 1812 wrote to memory of 1808 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 31 PID 1812 wrote to memory of 1808 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 31 PID 1812 wrote to memory of 1808 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 31 PID 1812 wrote to memory of 1808 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 31 PID 1812 wrote to memory of 1808 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 31 PID 1812 wrote to memory of 1808 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 31 PID 1812 wrote to memory of 1808 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 31 PID 1812 wrote to memory of 1500 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 34 PID 1812 wrote to memory of 1500 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 34 PID 1812 wrote to memory of 1500 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 34 PID 1812 wrote to memory of 1500 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 34 PID 1812 wrote to memory of 432 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 36 PID 1812 wrote to memory of 432 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 36 PID 1812 wrote to memory of 432 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 36 PID 1812 wrote to memory of 432 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 36 PID 1812 wrote to memory of 540 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 38 PID 1812 wrote to memory of 540 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 38 PID 1812 wrote to memory of 540 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 38 PID 1812 wrote to memory of 540 1812 61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe 38 PID 432 wrote to memory of 1972 432 cmd.exe 39 PID 432 wrote to memory of 1972 432 cmd.exe 39 PID 432 wrote to memory of 1972 432 cmd.exe 39 PID 432 wrote to memory of 1972 432 cmd.exe 39 PID 820 wrote to memory of 112 820 msiexec.exe 41 PID 820 wrote to memory of 112 820 msiexec.exe 41 PID 820 wrote to memory of 112 820 msiexec.exe 41 PID 820 wrote to memory of 112 820 msiexec.exe 41 PID 820 wrote to memory of 112 820 msiexec.exe 41 PID 820 wrote to memory of 112 820 msiexec.exe 41 PID 820 wrote to memory of 112 820 msiexec.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe"C:\Users\Admin\AppData\Local\Temp\61bae6cd3276abc4b0423a37237c04cf204dfcfdd9fde931c5d3681ff9e8788b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run_kl_file.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\ki1B03D.tmpC:\Users\Admin\AppData\Local\Temp\ki1B03D.tmp3⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ins2EFE.tmp.msi" /quiet2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵PID:1500
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\61BAE6~1.EXE > nul2⤵
- Deletes itself
PID:540
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 348C5EDFA4A00B47C049DC4989A159CE2⤵
- Loads dropped DLL
PID:112
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵PID:1620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123.0MB
MD5cb9ffa96ec2212d183c546afde8d98cb
SHA16e3d624e062cdbcf186a0a4bfd88e1e4fdae048d
SHA2563ccd96f6724d85214787a8cdc4bfb46878f1304c397e2b83122a46d3b61f1e49
SHA512e22249479d93c20c7ecc4cc8842afcfaf02d2a0ee302ae7432ea22114a67406c06ed70a959bb8d02614d6699f9170a5c5bf9d6801bdbedecd93f2ddd0c1cd8ac
-
Filesize
123.0MB
MD51d4fee5773747013c7788bc5bbaf7e24
SHA1e4251107af96a8859c43da2045cebe66ee41f0ad
SHA256bb034303edaa4c7b14fd4a8f8f5dc28ae0d162d0433eebd4ee6798b4bbce609e
SHA5126f71b1b43dd0687a6755e3c5f48cefc851ed43783a3b631175a1c64117da3f1fe7188ce0b612362152a401d6969348381d3c027c01386df93b70b5ea3884cbf7
-
Filesize
123.0MB
MD51d4fee5773747013c7788bc5bbaf7e24
SHA1e4251107af96a8859c43da2045cebe66ee41f0ad
SHA256bb034303edaa4c7b14fd4a8f8f5dc28ae0d162d0433eebd4ee6798b4bbce609e
SHA5126f71b1b43dd0687a6755e3c5f48cefc851ed43783a3b631175a1c64117da3f1fe7188ce0b612362152a401d6969348381d3c027c01386df93b70b5ea3884cbf7
-
Filesize
57B
MD5e69a6ff5fc89d626f09b965e65247871
SHA15c57fdb4583aca486679cccef6bb85d04878c30a
SHA2566fa3113a40c1a606249e03511d9ca857f080a1493843abf9973fc574ad42d689
SHA5125d9ba18db3824d0e0f0b7efd78f17e0043e04c8bcaceccab88fa77487e5ebd91c0a0230b893f3616dca361ce2e51295463ea16b03bc4a726859e1f088fbd0cce
-
Filesize
45B
MD5bfa46da4c876bdc048115f958d4ba19b
SHA128d6b72a621bbf71a89a8a739870cd35e3465d08
SHA2564aed99e6a053a61a2e14ff73958d3d758ebeaddf4022799e4c011c0d174daa18
SHA5124d486bae80674dc74812a0acd82d81743bb4cb2dea0a9fea0ffead1340cdc462b7e8d6a2dbf45e9e2d9fc59338b78f0b287ff405b13b20283db1ab3b05af737a
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
48KB
MD59067aad412defc0d2888479609041392
SHA136cfffc3bafeb24f88ad5886ca5787ca008b6ba9
SHA25699f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517
SHA512e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a
-
Filesize
48KB
MD59067aad412defc0d2888479609041392
SHA136cfffc3bafeb24f88ad5886ca5787ca008b6ba9
SHA25699f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517
SHA512e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0
-
Filesize
48.1MB
MD52bf824f5f142b4c33400abf21cc9396f
SHA169862ea88104204766ddfc798d7ba2d86d628eec
SHA25663613dd04ea94e88d051cf80fcc8ff67f33c842cd1ccbcc2dea46609b1ffac20
SHA5124130093984a5a1b6bdc652b35ef48da34cf4b23d8420c0da96e72c31d3defe5c44e34761b4152e73b43b76e3c58c5d36f9646140fc4c11aebb2c036e2e968bd4
-
Filesize
123.0MB
MD51d4fee5773747013c7788bc5bbaf7e24
SHA1e4251107af96a8859c43da2045cebe66ee41f0ad
SHA256bb034303edaa4c7b14fd4a8f8f5dc28ae0d162d0433eebd4ee6798b4bbce609e
SHA5126f71b1b43dd0687a6755e3c5f48cefc851ed43783a3b631175a1c64117da3f1fe7188ce0b612362152a401d6969348381d3c027c01386df93b70b5ea3884cbf7
-
Filesize
123.0MB
MD51d4fee5773747013c7788bc5bbaf7e24
SHA1e4251107af96a8859c43da2045cebe66ee41f0ad
SHA256bb034303edaa4c7b14fd4a8f8f5dc28ae0d162d0433eebd4ee6798b4bbce609e
SHA5126f71b1b43dd0687a6755e3c5f48cefc851ed43783a3b631175a1c64117da3f1fe7188ce0b612362152a401d6969348381d3c027c01386df93b70b5ea3884cbf7
-
Filesize
48KB
MD59067aad412defc0d2888479609041392
SHA136cfffc3bafeb24f88ad5886ca5787ca008b6ba9
SHA25699f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517
SHA512e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a
-
Filesize
48KB
MD59067aad412defc0d2888479609041392
SHA136cfffc3bafeb24f88ad5886ca5787ca008b6ba9
SHA25699f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517
SHA512e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a