Analysis
-
max time kernel
151s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 01:43
Behavioral task
behavioral1
Sample
8ef2ac633b5288161b178939649bd15cd4662e5a2cba180beb2209857cbe90ed.dll
Resource
win7-20220812-en
General
-
Target
8ef2ac633b5288161b178939649bd15cd4662e5a2cba180beb2209857cbe90ed.dll
-
Size
117KB
-
MD5
c6e5162d5eedff9c165d40f76b762a10
-
SHA1
17456823b6ece44f0d641f68a2282f3f4069494c
-
SHA256
8ef2ac633b5288161b178939649bd15cd4662e5a2cba180beb2209857cbe90ed
-
SHA512
97870ba8dd843daa101fe4ade9a1e44431854ca01418dbdbbcc7c7d6c929ea7a3d5c5e05e5d248a4b18e776313cc00659b0bef8de6a3b804d245ad6e1c4b28d4
-
SSDEEP
3072:OT6QTlxjLXCKDcMERjtJXVtEhKwtD90cUyU:O3HyvjTXLiKwtD9tU7
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000f000000012326-56.dat family_gh0strat behavioral1/files/0x000f000000012326-57.dat family_gh0strat -
Loads dropped DLL 1 IoCs
pid Process 1672 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Ceoi\Pgimikcmo.jpg rundll32.exe File created C:\Program Files (x86)\Ceoi\Pgimikcmo.jpg rundll32.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe 1672 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 1628 rundll32.exe Token: SeRestorePrivilege 1628 rundll32.exe Token: SeBackupPrivilege 1628 rundll32.exe Token: SeRestorePrivilege 1628 rundll32.exe Token: SeBackupPrivilege 1628 rundll32.exe Token: SeRestorePrivilege 1628 rundll32.exe Token: SeBackupPrivilege 1628 rundll32.exe Token: SeRestorePrivilege 1628 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1628 1716 rundll32.exe 28 PID 1716 wrote to memory of 1628 1716 rundll32.exe 28 PID 1716 wrote to memory of 1628 1716 rundll32.exe 28 PID 1716 wrote to memory of 1628 1716 rundll32.exe 28 PID 1716 wrote to memory of 1628 1716 rundll32.exe 28 PID 1716 wrote to memory of 1628 1716 rundll32.exe 28 PID 1716 wrote to memory of 1628 1716 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ef2ac633b5288161b178939649bd15cd4662e5a2cba180beb2209857cbe90ed.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ef2ac633b5288161b178939649bd15cd4662e5a2cba180beb2209857cbe90ed.dll,#12⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1672
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.2MB
MD5ec7c012bd48e820aa510e6bdf42194ec
SHA1265f2df3cc0472375fe39f9034d7b972d668f8dd
SHA2569fbebaa40d1cad20d895d240c8bfb675627b9c34691936420a8b5f53281ab83e
SHA5129bed7e786effff75bfe1be4e274e38c38066a15004274ba2a38978cd24d61cea3da4d6cd39741eba897c5029edd48571e63d7560cae004ca77586bbf8d67ec83
-
Filesize
10.2MB
MD5ec7c012bd48e820aa510e6bdf42194ec
SHA1265f2df3cc0472375fe39f9034d7b972d668f8dd
SHA2569fbebaa40d1cad20d895d240c8bfb675627b9c34691936420a8b5f53281ab83e
SHA5129bed7e786effff75bfe1be4e274e38c38066a15004274ba2a38978cd24d61cea3da4d6cd39741eba897c5029edd48571e63d7560cae004ca77586bbf8d67ec83