Analysis
-
max time kernel
186s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 04:43
Behavioral task
behavioral1
Sample
770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe
Resource
win7-20221111-en
General
-
Target
770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe
-
Size
138KB
-
MD5
e05e33b5383ff73f4225d9bd6e691874
-
SHA1
ce3c1ed51c84c73b38f88ab3e430238c6cc1791d
-
SHA256
770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564
-
SHA512
8389723b92e309ead143ed2e4deb3f0b1b62f29736a613dfbdb8bf3103bf4ecf950b5cdb8e62edc41d0bdc750c9cd68f984369843f245d8cef01614877a3911a
-
SSDEEP
3072:64vBKS+26Y8zoz4EfZRzUKR/F4pEIbybZuwq1UqRPeqov:6m8tA1fYmFEX2ZuwqC8eqo
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x000600000002315c-132.dat family_gh0strat behavioral2/files/0x000a000000023161-133.dat family_gh0strat behavioral2/files/0x000a000000023161-134.dat family_gh0strat behavioral2/files/0x000600000002315c-136.dat family_gh0strat -
Loads dropped DLL 2 IoCs
pid Process 1308 770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe 2504 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Dkha\Vksgvjpyx.pic 770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe File opened for modification C:\Program Files (x86)\Dkha\Vksgvjpyx.pic 770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe 2504 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 1308 770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe Token: SeRestorePrivilege 1308 770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe Token: SeBackupPrivilege 1308 770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe Token: SeRestorePrivilege 1308 770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe Token: SeBackupPrivilege 1308 770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe Token: SeRestorePrivilege 1308 770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe Token: SeBackupPrivilege 1308 770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe Token: SeRestorePrivilege 1308 770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe"C:\Users\Admin\AppData\Local\Temp\770583402219d4593b015980c92874dc2f8c618b1e0f75abd85ed9e9e66a0564.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2504
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5a98cab65dab084679223253d9f1a55cb
SHA13274088eded9f500c9bb9edbf1da45cb2b4726ac
SHA2567a67045cb3c5e2eced90a332fba999eb5c53a7d5ad0246272d2cebc048024013
SHA512662bcd180d74ad2682ed9d290299c0def1d938ffd1fe962eff5ed49f544793922f1eae6838d67385033a9c51c444072ae1d0d10e59cb084ab48884c0566c92ec
-
Filesize
105KB
MD5a98cab65dab084679223253d9f1a55cb
SHA13274088eded9f500c9bb9edbf1da45cb2b4726ac
SHA2567a67045cb3c5e2eced90a332fba999eb5c53a7d5ad0246272d2cebc048024013
SHA512662bcd180d74ad2682ed9d290299c0def1d938ffd1fe962eff5ed49f544793922f1eae6838d67385033a9c51c444072ae1d0d10e59cb084ab48884c0566c92ec
-
Filesize
10.1MB
MD507656f6996f150bcaa49e6781fb54a9a
SHA1b85cfd6a04c6d2d20edc045b17f4f1807cb614a4
SHA2567648991fa6695c8fba4fe713ead80fd846b8f4dd58998a1e315e96a2c885689d
SHA512c3671b730211203bdb039c47b3f6f541fa88725e384b97df0ad0a46a45aaeb5fd26d4d06a9636d62fcb36b1840a57cb7a697100c00197e7bf156e5bbc6f859cb
-
Filesize
116B
MD5002c6dbb020b147326e5ce1e08749772
SHA155efdacda6719ca6815dc8134e0b59a8eb02ca60
SHA2568a7e0515216385590e9ea395fe74a7d1af332b3df3abf362bded4dfd08cf5acb
SHA512495e11fb424126f9d5bb1113da319448c4e6cf389d7a47799da0c41f2ca54ca6520d610ccc21c1ee4b81b2ee234b29bc795f9a7e8a40b9ea5d1ad60202317f5e
-
Filesize
10.1MB
MD507656f6996f150bcaa49e6781fb54a9a
SHA1b85cfd6a04c6d2d20edc045b17f4f1807cb614a4
SHA2567648991fa6695c8fba4fe713ead80fd846b8f4dd58998a1e315e96a2c885689d
SHA512c3671b730211203bdb039c47b3f6f541fa88725e384b97df0ad0a46a45aaeb5fd26d4d06a9636d62fcb36b1840a57cb7a697100c00197e7bf156e5bbc6f859cb