Analysis
-
max time kernel
182s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 10:20
Static task
static1
Behavioral task
behavioral1
Sample
56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe
Resource
win10v2004-20221111-en
General
-
Target
56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe
-
Size
80KB
-
MD5
5a1968b1d29f4cc6806eafd7e31c2581
-
SHA1
c8b4a7f3dd5c3ffec750ebf71415220fdd96d917
-
SHA256
56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d
-
SHA512
c356c46545222e95263bdd0211eb20a0822ca731f10c99acd9fc06b99062bbd2e762d9413f8b11a8fa18fba43ff7925745faa8448c2bc81c48649ce40233fe6c
-
SSDEEP
1536:RF3xLnC1Je809MlOoF1HS5q97JvVIa9fNDTWeiSRMqcWs2Jd8NCuPTrUo:RF3s1Je8ZEoFZSg9vVIysS/ZsCd8NCur
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/1188-135-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/1188-134-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/1188-138-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\59335F98 = "C:\\Windows\\59335F98\\svchsot.exe" 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\59335F98\svchsot.exe 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe File created C:\Windows\59335F98\svchsot.exe 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe Token: SeDebugPrivilege 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1188 wrote to memory of 5116 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe 85 PID 1188 wrote to memory of 5116 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe 85 PID 1188 wrote to memory of 5116 1188 56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe 85 PID 5116 wrote to memory of 3580 5116 net.exe 87 PID 5116 wrote to memory of 3580 5116 net.exe 87 PID 5116 wrote to memory of 3580 5116 net.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe"C:\Users\Admin\AppData\Local\Temp\56ec68b92f8b2305385687726eb035850bca8874cde24427382c7ef07423215d.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:3580
-
-