Analysis
-
max time kernel
155s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 17:31
Behavioral task
behavioral1
Sample
fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe
Resource
win7-20221111-en
General
-
Target
fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe
-
Size
146KB
-
MD5
c48f2e2aee9a14a1811f8d19d6b0b879
-
SHA1
95f6695525c628ed4cdfce0c516a9897c65234ee
-
SHA256
fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6
-
SHA512
e98573d9362b9c51b14f408e1d9e15a381cc716cfea4233d6c65d2920df61160a2a7c93ea200e091059c550b3d7ceddb1be9fbc910a12bbf0c373dbc0a2ea632
-
SSDEEP
3072:ggEehZ6lngDMYUxHkq15yoY0f4S07tVaTqXuz1KJoZAo5LH5u:ggEehkHkmMoY0xoV00uz1PZAS
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
Processes:
resource yara_rule C:\Windows\xinstall9100.dll family_gh0strat \??\c:\program files (x86)\agef\fpyesabfa.pic family_gh0strat C:\Program Files (x86)\Agef\Fpyesabfa.pic family_gh0strat C:\windows\xinstall9100.dll family_gh0strat -
Loads dropped DLL 2 IoCs
Processes:
fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exesvchost.exepid process 1360 fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe 3964 svchost.exe -
Drops file in Program Files directory 2 IoCs
Processes:
fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exedescription ioc process File created C:\Program Files (x86)\Agef\Fpyesabfa.pic fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe File opened for modification C:\Program Files (x86)\Agef\Fpyesabfa.pic fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe -
Drops file in Windows directory 2 IoCs
Processes:
fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exedescription ioc process File created C:\windows\xinstall9100.dll fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe File opened for modification C:\windows\xinstall9100.dll fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe 3964 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid 4 4 4 4 4 648 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exedescription pid process Token: SeBackupPrivilege 1360 fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe Token: SeRestorePrivilege 1360 fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe Token: SeBackupPrivilege 1360 fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe Token: SeRestorePrivilege 1360 fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe Token: SeBackupPrivilege 1360 fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe Token: SeRestorePrivilege 1360 fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe Token: SeBackupPrivilege 1360 fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe Token: SeRestorePrivilege 1360 fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe"C:\Users\Admin\AppData\Local\Temp\fcf4ee2868a0f2607a0998fcefc2741285c3d6aa41172b1dfd4e0a014c0bf7c6.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Agef\Fpyesabfa.picFilesize
14.1MB
MD534d8f3670ef22103a0a1ab99e1a1bf79
SHA1b9ad2086b818266f1a1e62cab8688db95f395d3f
SHA25630fd06cb57c45d683c35f08c672100f97f283d4be6d36338c98b0f8de307fa06
SHA5126da8e587089923a32a8626ae60d65ba04aa2be10ce9cf6d0e1b977dacc44b48172bcaa747d355f6b3e690a571540dfefffd015a1c18263752d1f07b590ebcc87
-
C:\Windows\xinstall9100.dllFilesize
126KB
MD59ea83111253838ac029211df562cd717
SHA1e1ef851cb46bb7423ac785f1d4846acc9684b2cb
SHA2560efa295ce1104489bdb0c76b190b097bc7f804ee89063c83ea49195197cc960f
SHA512345b5ba15514868ba9263755d38b39485d4b8140ee828637b0f1eaa6fca901fa592c79529c384dbc91394829259a2ee065a2d18e894e5e480b71cee7daa8c786
-
C:\windows\xinstall9100.dllFilesize
126KB
MD59ea83111253838ac029211df562cd717
SHA1e1ef851cb46bb7423ac785f1d4846acc9684b2cb
SHA2560efa295ce1104489bdb0c76b190b097bc7f804ee89063c83ea49195197cc960f
SHA512345b5ba15514868ba9263755d38b39485d4b8140ee828637b0f1eaa6fca901fa592c79529c384dbc91394829259a2ee065a2d18e894e5e480b71cee7daa8c786
-
\??\c:\NT_Path.jpgFilesize
130B
MD512b5865b7b471ee9c8a532f1780ef9ca
SHA119737c20166aa44be2ac0736fea869a445310ccb
SHA256e3b02139213794aeac88d647d1c62991c84d888d30f42fd7674be6e712baa36e
SHA512f950b36f6b8020ce54d44e0f0cca3999f853c6acfb665496b923752358155e485725ed763e371b2ecdc49c7b17066349e8d892c179a3bb259d00491c1dfeab14
-
\??\c:\program files (x86)\agef\fpyesabfa.picFilesize
14.1MB
MD534d8f3670ef22103a0a1ab99e1a1bf79
SHA1b9ad2086b818266f1a1e62cab8688db95f395d3f
SHA25630fd06cb57c45d683c35f08c672100f97f283d4be6d36338c98b0f8de307fa06
SHA5126da8e587089923a32a8626ae60d65ba04aa2be10ce9cf6d0e1b977dacc44b48172bcaa747d355f6b3e690a571540dfefffd015a1c18263752d1f07b590ebcc87