Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 10:22
Behavioral task
behavioral1
Sample
b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd.exe
Resource
win10v2004-20220812-en
General
-
Target
b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd.exe
-
Size
108KB
-
MD5
e7dd01078aa7d5e76f841cdd9e8ed3c1
-
SHA1
bbe9c132104b183537f4e8dbdbfda3af40571024
-
SHA256
b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd
-
SHA512
00bdfa47c6f242b9f3e076d471548a06052b02a7732f1f163e34a6d758d1b3d6b802087194c412f10d43d276da80d6fe648d9e45a81df24fe92202f1e8e90e03
-
SSDEEP
3072:/ESUnnVCKBt2q0nyXUmeR6dWj/RaJJ1cOxrpW:/ESUnnVhBt2qKCUmQbjZoJ12
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral2/memory/2472-132-0x0000000000400000-0x000000000041A268-memory.dmp family_gh0strat behavioral2/memory/2472-134-0x0000000000400000-0x000000000041A268-memory.dmp family_gh0strat behavioral2/files/0x000a000000022e63-133.dat family_gh0strat behavioral2/files/0x000a000000022e63-135.dat family_gh0strat behavioral2/files/0x000a000000022e63-137.dat family_gh0strat behavioral2/memory/4840-138-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat behavioral2/memory/2828-139-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat behavioral2/memory/4840-140-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat -
Blocklisted process makes network request 2 IoCs
flow pid Process 6 2828 rundll32.exe 37 2828 rundll32.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\360svc\Parameters\ServiceDll = "C:\\Windows\\Web\\e567709kill.dll" b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd.exe -
Loads dropped DLL 2 IoCs
pid Process 4840 svchost.exe 2828 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Web b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd.exe File created C:\Windows\Web\e567709kill.dll b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4840 svchost.exe Token: SeDebugPrivilege 2828 rundll32.exe Token: SeDebugPrivilege 2828 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4840 wrote to memory of 2828 4840 svchost.exe 84 PID 4840 wrote to memory of 2828 4840 svchost.exe 84 PID 4840 wrote to memory of 2828 4840 svchost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd.exe"C:\Users\Admin\AppData\Local\Temp\b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in Windows directory
PID:2472
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\web\e567709kill.dll wintest2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5e984c69ed7adc8d6ac5849e043d55ad4
SHA11d3cfffdd16c01cef21b016f6c7f0acc1ae471c9
SHA256913b8acc259df751371146b09ca4b96a422df61ded6dba0d6c0e12875e17c50a
SHA512278d059a439c85b55fc24d72c15d9c5920d14963f2a4e86e68f10b03bf07d6cf0baeb5eaf84a54a29ac2cd9cf99fe6b122c1e2bd9e6267570852d71c1dfc1f2e
-
Filesize
90KB
MD5e984c69ed7adc8d6ac5849e043d55ad4
SHA11d3cfffdd16c01cef21b016f6c7f0acc1ae471c9
SHA256913b8acc259df751371146b09ca4b96a422df61ded6dba0d6c0e12875e17c50a
SHA512278d059a439c85b55fc24d72c15d9c5920d14963f2a4e86e68f10b03bf07d6cf0baeb5eaf84a54a29ac2cd9cf99fe6b122c1e2bd9e6267570852d71c1dfc1f2e
-
Filesize
90KB
MD5e984c69ed7adc8d6ac5849e043d55ad4
SHA11d3cfffdd16c01cef21b016f6c7f0acc1ae471c9
SHA256913b8acc259df751371146b09ca4b96a422df61ded6dba0d6c0e12875e17c50a
SHA512278d059a439c85b55fc24d72c15d9c5920d14963f2a4e86e68f10b03bf07d6cf0baeb5eaf84a54a29ac2cd9cf99fe6b122c1e2bd9e6267570852d71c1dfc1f2e