Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 11:03
Behavioral task
behavioral1
Sample
f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe
Resource
win7-20220812-en
General
-
Target
f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe
-
Size
108KB
-
MD5
f6521e23da5fb9e84c00d2b3faa9c319
-
SHA1
ac0bcece942b03077345341779bc544418878a6d
-
SHA256
f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332
-
SHA512
cd1a14d5a291c4b42b594fc0a4c1e1267653fcd669fb2c92377a47952ad8b73480e76a8ff8f5c42eb7bb88282bdf3661d69b7e076a12d7e00d458e563e09f898
-
SSDEEP
3072:aYVVWo4zw+6A1gSsh0lcs7zdsmOhNbt+g99zte8S:hVyzw+TsYzzSZzQg99zoh
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/1976-59-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat behavioral1/files/0x00140000000054ab-60.dat family_gh0strat behavioral1/files/0x00140000000054ab-61.dat family_gh0strat behavioral1/files/0x00140000000054ab-63.dat family_gh0strat behavioral1/files/0x00140000000054ab-64.dat family_gh0strat behavioral1/files/0x00140000000054ab-62.dat family_gh0strat behavioral1/files/0x00090000000126f1-65.dat family_gh0strat behavioral1/files/0x00090000000126f1-66.dat family_gh0strat -
Loads dropped DLL 5 IoCs
pid Process 1548 rundll32.exe 1548 rundll32.exe 1548 rundll32.exe 1548 rundll32.exe 1532 svchost.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\PROGRA~2\KB067075768.dll f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe File created C:\Program Files (x86)\Common Files\System\hedubgtfp.eul rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\System\hedubgtfp.eul rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1548 rundll32.exe 1548 rundll32.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe 1532 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1548 rundll32.exe Token: SeRestorePrivilege 1548 rundll32.exe Token: SeRestorePrivilege 1548 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1976 wrote to memory of 872 1976 f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe 28 PID 1976 wrote to memory of 872 1976 f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe 28 PID 1976 wrote to memory of 872 1976 f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe 28 PID 1976 wrote to memory of 872 1976 f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe 28 PID 1976 wrote to memory of 872 1976 f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe 28 PID 1976 wrote to memory of 872 1976 f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe 28 PID 1976 wrote to memory of 872 1976 f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe 28 PID 872 wrote to memory of 1548 872 cmd.exe 30 PID 872 wrote to memory of 1548 872 cmd.exe 30 PID 872 wrote to memory of 1548 872 cmd.exe 30 PID 872 wrote to memory of 1548 872 cmd.exe 30 PID 872 wrote to memory of 1548 872 cmd.exe 30 PID 872 wrote to memory of 1548 872 cmd.exe 30 PID 872 wrote to memory of 1548 872 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe"C:\Users\Admin\AppData\Local\Temp\f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Update7075768.BAT" "2⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\PROGRA~2\KB067075768.dll,x #C:\PROGRA~2\KB067075768.dll##0#0#═°┬τ░▓╚½╧╡═│##ocSLmaa=#360sd#yAzR1cSNmNiMlAXMzNCSmdaKaa==#C:\Users\Admin\AppData\Local\Temp\f79527f6a0d44984813c08eabb0a41715ed7125cb466f52e5bb2db42443ab332.exe3⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.8MB
MD588b757855ea1acefc9fe9b2adc3c7703
SHA11963b00a705be4bd0dad6d8424ff669fc678c98e
SHA256e6b9988a76fe81adfeb14a1d40e63f2f244e8b93032d11c050ac5228762bdba0
SHA512d48e3cb45fb2739195d0a41e455f275e4451857e18cdbdc400591b8ad3ce837e303059d3af7992a81f52965d98957c495fce10bc118cac9d80fa5d394062ec8c
-
Filesize
238B
MD5ceb3e0feac094157f6fa0fcc696de958
SHA16b12190558c4ab755f439c2be0fb1317c5b5dda0
SHA2560bbaebf3c49b58f2ffdb06c2d9ddcc3a04724e17773b2991a4812ac64fc605a2
SHA512c0bd67555cdf8ce1a5d2b228e9b033da4a309aef25e14e6a07f2960e400e0725c1996c8b4dcfbd63a6db5e701db42dd29ce8bf9723aa2aa7a48f0f79d3cdf32b
-
Filesize
9.8MB
MD588b757855ea1acefc9fe9b2adc3c7703
SHA11963b00a705be4bd0dad6d8424ff669fc678c98e
SHA256e6b9988a76fe81adfeb14a1d40e63f2f244e8b93032d11c050ac5228762bdba0
SHA512d48e3cb45fb2739195d0a41e455f275e4451857e18cdbdc400591b8ad3ce837e303059d3af7992a81f52965d98957c495fce10bc118cac9d80fa5d394062ec8c
-
Filesize
9.8MB
MD588b757855ea1acefc9fe9b2adc3c7703
SHA11963b00a705be4bd0dad6d8424ff669fc678c98e
SHA256e6b9988a76fe81adfeb14a1d40e63f2f244e8b93032d11c050ac5228762bdba0
SHA512d48e3cb45fb2739195d0a41e455f275e4451857e18cdbdc400591b8ad3ce837e303059d3af7992a81f52965d98957c495fce10bc118cac9d80fa5d394062ec8c
-
Filesize
9.8MB
MD588b757855ea1acefc9fe9b2adc3c7703
SHA11963b00a705be4bd0dad6d8424ff669fc678c98e
SHA256e6b9988a76fe81adfeb14a1d40e63f2f244e8b93032d11c050ac5228762bdba0
SHA512d48e3cb45fb2739195d0a41e455f275e4451857e18cdbdc400591b8ad3ce837e303059d3af7992a81f52965d98957c495fce10bc118cac9d80fa5d394062ec8c
-
Filesize
9.8MB
MD588b757855ea1acefc9fe9b2adc3c7703
SHA11963b00a705be4bd0dad6d8424ff669fc678c98e
SHA256e6b9988a76fe81adfeb14a1d40e63f2f244e8b93032d11c050ac5228762bdba0
SHA512d48e3cb45fb2739195d0a41e455f275e4451857e18cdbdc400591b8ad3ce837e303059d3af7992a81f52965d98957c495fce10bc118cac9d80fa5d394062ec8c
-
Filesize
9.8MB
MD588b757855ea1acefc9fe9b2adc3c7703
SHA11963b00a705be4bd0dad6d8424ff669fc678c98e
SHA256e6b9988a76fe81adfeb14a1d40e63f2f244e8b93032d11c050ac5228762bdba0
SHA512d48e3cb45fb2739195d0a41e455f275e4451857e18cdbdc400591b8ad3ce837e303059d3af7992a81f52965d98957c495fce10bc118cac9d80fa5d394062ec8c
-
Filesize
9.8MB
MD588b757855ea1acefc9fe9b2adc3c7703
SHA11963b00a705be4bd0dad6d8424ff669fc678c98e
SHA256e6b9988a76fe81adfeb14a1d40e63f2f244e8b93032d11c050ac5228762bdba0
SHA512d48e3cb45fb2739195d0a41e455f275e4451857e18cdbdc400591b8ad3ce837e303059d3af7992a81f52965d98957c495fce10bc118cac9d80fa5d394062ec8c