Analysis
-
max time kernel
286s -
max time network
393s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 01:58
Behavioral task
behavioral1
Sample
d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe
Resource
win7-20220812-en
General
-
Target
d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe
-
Size
236KB
-
MD5
33dee9cce9d3189a0102fc8dee0ca294
-
SHA1
7ce30a7252b330f60729fca10a3ae4bea3d6f69d
-
SHA256
d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b
-
SHA512
8e220176fb48a33f8233cbd9cf997ab736b6633a2bb115690b78c50d00d082e2b53381125743efc5fb4b8e29d9522d87eaf5360bfcce01d2f146d74a81eeb814
-
SSDEEP
3072:IvHzqtu0IPeqovhA58gMreQNihzFEnitlffRo+8uRJUZZWFIYzSf+eqo9a:OP0Ieqo5bN2l3f6KgZZY+Geqo
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000c000000022de0-134.dat family_gh0strat behavioral2/files/0x000c000000022de0-135.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 772 9947B2A0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\Windows\9947B2A0.exe d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe File opened for modification \??\c:\Windows\9947B2A0.exe d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe -
Kills process with taskkill 1 IoCs
pid Process 4976 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4976 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4976 4172 d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe 81 PID 4172 wrote to memory of 4976 4172 d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe 81 PID 4172 wrote to memory of 4976 4172 d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe 81 PID 4172 wrote to memory of 772 4172 d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe 83 PID 4172 wrote to memory of 772 4172 d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe 83 PID 4172 wrote to memory of 772 4172 d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe 83 PID 4172 wrote to memory of 2244 4172 d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe 85 PID 4172 wrote to memory of 2244 4172 d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe 85 PID 4172 wrote to memory of 2244 4172 d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe"C:\Users\Admin\AppData\Local\Temp\d01f4e7c70a0b2da75ca3ca6faa108b39c7b2dbe58977aa5cecfc4f03796631b.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im KSafeTray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
\??\c:\Windows\9947B2A0.exec:\Windows\9947B2A0.exe2⤵
- Executes dropped EXE
PID:772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat2⤵PID:2244
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56383d8e7d5c4721862c6d7e1a4f44f68
SHA1ac57118a41707068e48daaafd3f97d4abf89bc1c
SHA2560648a0ca3bb4d3dfd0ca0b4c7320ca79405ac01efdf77437d2fe878eea81e543
SHA51298a485b53d420b781936ecfa2fdaf12ac4dbf2c8186e21a783a1d991e76537b78141c13c1206ab37db17d5ddba9ce4cc0c77ba9931113ac4f9e7db6715bddb6b
-
Filesize
176KB
MD506857314bf53cc7d247d7473a38c21f9
SHA11914c60cc9d4993f01d64b0455b6a58efa97c3ef
SHA25691875d6c4b24f1874b102230888ee891c91814e673ab238767a2cd5e2aa4d16c
SHA5121454c3121f20ee59dc9e0c02b6cebba14a9fd680905e18115891a5d9518924e66992fb169c45bc671eb8d91723ac1642a0034363e701aa2d10283aa1eab63ae3
-
Filesize
176KB
MD506857314bf53cc7d247d7473a38c21f9
SHA11914c60cc9d4993f01d64b0455b6a58efa97c3ef
SHA25691875d6c4b24f1874b102230888ee891c91814e673ab238767a2cd5e2aa4d16c
SHA5121454c3121f20ee59dc9e0c02b6cebba14a9fd680905e18115891a5d9518924e66992fb169c45bc671eb8d91723ac1642a0034363e701aa2d10283aa1eab63ae3