Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 17:34
Behavioral task
behavioral1
Sample
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe
Resource
win7-20220901-en
General
-
Target
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe
-
Size
164KB
-
MD5
27cec1668216473595fee2f28bd45a70
-
SHA1
955f96f7e0b289f37afab359504505a84f75bb45
-
SHA256
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da
-
SHA512
d0e1b022c800598d7680c645927e1eb5621a1356b5697b8824a27f1babca2a48d295906738322f9edf45851f1b4f2bdf4b0771eefb5167460e13b8048c5cabbc
-
SSDEEP
3072:brpO1VLtIpDmLx8nvbeJXTGoxQpyTDm8PSkNLNs+9+J34:br4LS6ObyX6StTSsSkdE3
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
Processes:
resource yara_rule \??\c:\program files (x86)\common files\centerv.gzip family_gh0strat \Program Files (x86)\Common Files\Centerv.gzip family_gh0strat C:\windows\Prefetch997100.dll family_gh0strat behavioral1/memory/1348-62-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat behavioral1/memory/1152-63-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat behavioral1/memory/1348-64-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat behavioral1/memory/1152-65-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1152 svchost.exe -
Loads dropped DLL 1 IoCs
Processes:
svchost.exepid process 1152 svchost.exe -
Drops file in Program Files directory 3 IoCs
Processes:
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exedescription ioc process File created \??\c:\Program Files\NT_Path.gif 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe File opened for modification C:\Program Files (x86)\Common Files\Centerv.gzip 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe File created C:\Program Files (x86)\Common Files\Centerv.gzip 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe -
Drops file in Windows directory 1 IoCs
Processes:
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exedescription ioc process File created C:\windows\Prefetch997100.dll 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1204 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
svchost.exepid process 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe 1152 svchost.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
taskkill.exe576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exedescription pid process Token: SeDebugPrivilege 1204 taskkill.exe Token: SeBackupPrivilege 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeRestorePrivilege 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeBackupPrivilege 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeRestorePrivilege 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeBackupPrivilege 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeRestorePrivilege 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeBackupPrivilege 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeRestorePrivilege 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exedescription pid process target process PID 1348 wrote to memory of 1204 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe taskkill.exe PID 1348 wrote to memory of 1204 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe taskkill.exe PID 1348 wrote to memory of 1204 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe taskkill.exe PID 1348 wrote to memory of 1204 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe taskkill.exe PID 1348 wrote to memory of 1204 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe taskkill.exe PID 1348 wrote to memory of 1204 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe taskkill.exe PID 1348 wrote to memory of 1204 1348 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe"C:\Users\Admin\AppData\Local\Temp\576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\windows\Prefetch997100.dllFilesize
140KB
MD540a3677554943b82483bb666f0f38c9e
SHA1948bd00e70aec3f266e5241fb37e3bef4cfaa992
SHA256c9dd61eff58c55517f886b25fb161784b4430756b46a5794751f92018cdc4e8f
SHA512d8ebada743f688c6962bfdcdf181122ea3811a765360665bce6cb403a74e0c0a679fb31f203aeb68609f1b01592b483ed1a30b37718f6412c7872af0cecb3d8e
-
\??\c:\Program Files\NT_Path.gifFilesize
132B
MD5cd9edd5e13b8add22140004663a270e6
SHA133b208c3a2c0a85e045ea5c265b12927b16f0d81
SHA256d3a23765d32a661687c13a6317932eaeb9507f043ece2f0799bcc08479439d9f
SHA5121298aeb9301ccd97e693c2c89a59653f8e4c6b5e4f7cbdba22398e9e4255c53491a13f13c5660cb17b696b3d8474f6a0136eb3498d28ff8325b1037070fb8421
-
\??\c:\program files (x86)\common files\centerv.gzipFilesize
1.9MB
MD52b6a2d0867ad7b034b8fac976ceedb01
SHA173fb4ffe14b615a2df6a32410d93739c7baf7572
SHA25640ae16d0dd246574d8b7620b8143caef31cbe90d284e6a1e2e5da0a7652719f7
SHA5120288fe7bb9e5096a6d33a64ee23efcf82ac633611d74eca0bb4ae313fabf4165dd384b5d3d392cfa726a6b576e056b81dcc7b8111edd135a22046346e02fb926
-
\Program Files (x86)\Common Files\Centerv.gzipFilesize
1.9MB
MD52b6a2d0867ad7b034b8fac976ceedb01
SHA173fb4ffe14b615a2df6a32410d93739c7baf7572
SHA25640ae16d0dd246574d8b7620b8143caef31cbe90d284e6a1e2e5da0a7652719f7
SHA5120288fe7bb9e5096a6d33a64ee23efcf82ac633611d74eca0bb4ae313fabf4165dd384b5d3d392cfa726a6b576e056b81dcc7b8111edd135a22046346e02fb926
-
memory/1152-63-0x0000000010000000-0x0000000010025000-memory.dmpFilesize
148KB
-
memory/1152-65-0x0000000010000000-0x0000000010025000-memory.dmpFilesize
148KB
-
memory/1204-55-0x0000000000000000-mapping.dmp
-
memory/1348-54-0x0000000075601000-0x0000000075603000-memory.dmpFilesize
8KB
-
memory/1348-62-0x0000000010000000-0x0000000010025000-memory.dmpFilesize
148KB
-
memory/1348-64-0x0000000010000000-0x0000000010025000-memory.dmpFilesize
148KB