Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 17:34
Behavioral task
behavioral1
Sample
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe
Resource
win7-20220901-en
General
-
Target
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe
-
Size
164KB
-
MD5
27cec1668216473595fee2f28bd45a70
-
SHA1
955f96f7e0b289f37afab359504505a84f75bb45
-
SHA256
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da
-
SHA512
d0e1b022c800598d7680c645927e1eb5621a1356b5697b8824a27f1babca2a48d295906738322f9edf45851f1b4f2bdf4b0771eefb5167460e13b8048c5cabbc
-
SSDEEP
3072:brpO1VLtIpDmLx8nvbeJXTGoxQpyTDm8PSkNLNs+9+J34:br4LS6ObyX6StTSsSkdE3
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
Processes:
resource yara_rule C:\Windows\Prefetch2085700.dll family_gh0strat behavioral2/memory/1092-134-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat \??\c:\program files (x86)\common files\centerv.gzip family_gh0strat behavioral2/memory/1092-136-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat C:\Program Files (x86)\Common Files\Centerv.gzip family_gh0strat behavioral2/memory/4664-138-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat C:\windows\Prefetch2085700.dll family_gh0strat behavioral2/memory/4664-141-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat -
Loads dropped DLL 2 IoCs
Processes:
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exesvchost.exepid process 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe 4664 svchost.exe -
Drops file in Program Files directory 3 IoCs
Processes:
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exedescription ioc process File created \??\c:\Program Files\NT_Path.gif 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe File opened for modification C:\Program Files (x86)\Common Files\Centerv.gzip 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe File created C:\Program Files (x86)\Common Files\Centerv.gzip 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe -
Drops file in Windows directory 1 IoCs
Processes:
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exedescription ioc process File created C:\windows\Prefetch2085700.dll 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1624 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid 4 4 4 4 4 648 -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
taskkill.exe576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exedescription pid process Token: SeDebugPrivilege 1624 taskkill.exe Token: SeBackupPrivilege 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeRestorePrivilege 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeBackupPrivilege 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeRestorePrivilege 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeBackupPrivilege 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeRestorePrivilege 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeBackupPrivilege 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe Token: SeRestorePrivilege 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exedescription pid process target process PID 1092 wrote to memory of 1624 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe taskkill.exe PID 1092 wrote to memory of 1624 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe taskkill.exe PID 1092 wrote to memory of 1624 1092 576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe"C:\Users\Admin\AppData\Local\Temp\576b7228060f83db6e520e306cb31146a382cf4d3a980a59c4a68c8aefc0b8da.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\Centerv.gzipFilesize
10.5MB
MD5f1b04b0188d33b293b322429290585b8
SHA1ac8af647e07d0389a9b8c17e223d18cfc7577319
SHA256d7cb2021e6084c18e876da454ce8baeea83c867940668e2d2f6f2837609a3d6c
SHA5125c8d262d70fb571186bdd0a22f63db8028846b8b99b0f1736466b881fdbb9a7ea299ab4930088a80d99bcf7ced23c09397211339ba812ffb75dac42932da8fef
-
C:\Windows\Prefetch2085700.dllFilesize
140KB
MD540a3677554943b82483bb666f0f38c9e
SHA1948bd00e70aec3f266e5241fb37e3bef4cfaa992
SHA256c9dd61eff58c55517f886b25fb161784b4430756b46a5794751f92018cdc4e8f
SHA512d8ebada743f688c6962bfdcdf181122ea3811a765360665bce6cb403a74e0c0a679fb31f203aeb68609f1b01592b483ed1a30b37718f6412c7872af0cecb3d8e
-
C:\windows\Prefetch2085700.dllFilesize
140KB
MD540a3677554943b82483bb666f0f38c9e
SHA1948bd00e70aec3f266e5241fb37e3bef4cfaa992
SHA256c9dd61eff58c55517f886b25fb161784b4430756b46a5794751f92018cdc4e8f
SHA512d8ebada743f688c6962bfdcdf181122ea3811a765360665bce6cb403a74e0c0a679fb31f203aeb68609f1b01592b483ed1a30b37718f6412c7872af0cecb3d8e
-
\??\c:\Program Files\NT_Path.gifFilesize
133B
MD5ab9527d8b3bfa8cd70a634a6d1940805
SHA1e980b326574fd9eb29d251db133b7e36ee915e33
SHA256096384b953f79fe35aaf7157f0eb2f226cb888e2ea82997606b8ed5792ba9934
SHA5121750e032764d9f12f6f6eb38c1bd251f5d3d2afb33c6c34d5c2f2607de27b96f9d0eae3566163e1de7bae0179d74bb1acafa50257a8da83be21f5d24376bce16
-
\??\c:\program files (x86)\common files\centerv.gzipFilesize
10.5MB
MD5f1b04b0188d33b293b322429290585b8
SHA1ac8af647e07d0389a9b8c17e223d18cfc7577319
SHA256d7cb2021e6084c18e876da454ce8baeea83c867940668e2d2f6f2837609a3d6c
SHA5125c8d262d70fb571186bdd0a22f63db8028846b8b99b0f1736466b881fdbb9a7ea299ab4930088a80d99bcf7ced23c09397211339ba812ffb75dac42932da8fef
-
memory/1092-134-0x0000000010000000-0x0000000010025000-memory.dmpFilesize
148KB
-
memory/1092-136-0x0000000010000000-0x0000000010025000-memory.dmpFilesize
148KB
-
memory/1624-132-0x0000000000000000-mapping.dmp
-
memory/4664-138-0x0000000010000000-0x0000000010025000-memory.dmpFilesize
148KB
-
memory/4664-141-0x0000000010000000-0x0000000010025000-memory.dmpFilesize
148KB