Analysis
-
max time kernel
174s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 23:30
Behavioral task
behavioral1
Sample
e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe
Resource
win10v2004-20221111-en
General
-
Target
e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe
-
Size
2.0MB
-
MD5
df70662c7f535acc97affbf6e2e7057f
-
SHA1
7a42d87a74c44b19fe2a45091d5e76e53197a37a
-
SHA256
e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce
-
SHA512
30d9e1b1a677d76d7e4e1bf941f9759236366efc96cc66535fd0f019020a5f7f9ca379ab29544c0dbde4e0fe5d3fb112e29431fbc56d3947291d97a5c21e5d57
-
SSDEEP
49152:B/9PaL4YU6/ivJD0a4sFY2bG/OTAy+ltv5MFVBML:L5YT/gH/Fvb5oloFML
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x000200000002265d-138.dat family_gh0strat behavioral2/files/0x000200000002265d-140.dat family_gh0strat behavioral2/memory/2636-142-0x0000000000400000-0x000000000041C000-memory.dmp family_gh0strat behavioral2/memory/2636-150-0x0000000000400000-0x000000000041C000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 5068 DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe 2636 server.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility32.dll" server.exe -
resource yara_rule behavioral2/memory/3420-132-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3420-133-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3420-139-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\dnf01.com\NumberOfSubdomains = "1" DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\IESettingSync DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DOMStorage\dnf01.com DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\dnf01.com DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.dnf01.com DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.dnf01.com\ = "63" DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\dnf01.com\Total = "63" DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5068 DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe 5068 DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe 5068 DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe 5068 DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3420 wrote to memory of 5068 3420 e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe 84 PID 3420 wrote to memory of 5068 3420 e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe 84 PID 3420 wrote to memory of 5068 3420 e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe 84 PID 3420 wrote to memory of 2636 3420 e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe 85 PID 3420 wrote to memory of 2636 3420 e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe 85 PID 3420 wrote to memory of 2636 3420 e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe"C:\Users\Admin\AppData\Local\Temp\e7b32d3fb2885a25d2f07a5e1a216d292ca80c3a888113d6b232330eeb9814ce.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\Temp\DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe"C:\Users\Admin\AppData\Local\Temp\Temp\DNFÄÈÄÈ5.78APCÈ«ÆÁÃëɱ°æ.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\Temp\server.exe"2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
PID:2636
-
-
C:\Windows\System32\svchost.exeC:\Windows\\System32\\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵PID:2172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5093bed7e76ce12adb39a25a0a305eb5e
SHA13a519900a647f672e8772dc4817bbc737565d552
SHA2565d0e9d04527a4044aa04f34a0dd327ac5c59e72795313ab5a7707bac5534f50d
SHA512c38d9a4936b6bd61cea7e201bebd97c540fd41b06f41278fd98344fb11d84c10becb3e4dd98a6e146941169d484293c3956f653c6b36f5e5683a30ae6a0e1382
-
Filesize
2.1MB
MD5093bed7e76ce12adb39a25a0a305eb5e
SHA13a519900a647f672e8772dc4817bbc737565d552
SHA2565d0e9d04527a4044aa04f34a0dd327ac5c59e72795313ab5a7707bac5534f50d
SHA512c38d9a4936b6bd61cea7e201bebd97c540fd41b06f41278fd98344fb11d84c10becb3e4dd98a6e146941169d484293c3956f653c6b36f5e5683a30ae6a0e1382
-
Filesize
105KB
MD5e19310d0d750927972ea607c8b4457c7
SHA1af73b11b9bac5b8558d1354213032cb588f2136b
SHA2561e76fc6941324f529d2f050aff699f42f03f9d1cb52c1bb7c3c1204e04f8bf72
SHA512832418d2b0c0798d40b46af1b07df7a939612916c4d2c5fb5f29340042bc259154ece6a6d76f8ccfe9754d7ce7f8bed4bd1feb75159067898991739640dcb2bc
-
Filesize
105KB
MD5e19310d0d750927972ea607c8b4457c7
SHA1af73b11b9bac5b8558d1354213032cb588f2136b
SHA2561e76fc6941324f529d2f050aff699f42f03f9d1cb52c1bb7c3c1204e04f8bf72
SHA512832418d2b0c0798d40b46af1b07df7a939612916c4d2c5fb5f29340042bc259154ece6a6d76f8ccfe9754d7ce7f8bed4bd1feb75159067898991739640dcb2bc