Analysis
-
max time kernel
82s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe
Resource
win7-20221111-en
7 signatures
150 seconds
General
-
Target
f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe
-
Size
170KB
-
MD5
3fe33b8aa8c9b05ebefc3772f4666448
-
SHA1
96508a4c73100f3354d55fe178cbb8582aaa1050
-
SHA256
f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319
-
SHA512
88e9a5f631c59b35b4bd84b3532e4ae2898ed3101e3fc7df35b24fd219f00cadc91f8474036fcedd55e8b5acbaaa9cb3c1feb2ab045d28589779a4393a100972
-
SSDEEP
3072:sM53m4t41CVqUNILsOl6Hh5zVKCiXoaf4wfy+QxuNM85mdG62xE2N+t1pUOGy:sM52W41CVqVLsaA5JEv48FQxcM85mdwa
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1636-57-0x0000000000220000-0x000000000026C000-memory.dmp family_gh0strat behavioral1/memory/1636-58-0x0000000000220000-0x000000000026C000-memory.dmp family_gh0strat behavioral1/memory/1636-62-0x0000000000220000-0x000000000026C000-memory.dmp family_gh0strat -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1636 f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe 1636 f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe 1636 f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1636 f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1636 f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1356 1636 f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe 28 PID 1636 wrote to memory of 1356 1636 f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe 28 PID 1636 wrote to memory of 1356 1636 f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe 28 PID 1636 wrote to memory of 1356 1636 f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe 28 PID 1356 wrote to memory of 1172 1356 net.exe 30 PID 1356 wrote to memory of 1172 1356 net.exe 30 PID 1356 wrote to memory of 1172 1356 net.exe 30 PID 1356 wrote to memory of 1172 1356 net.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe"C:\Users\Admin\AppData\Local\Temp\f734f976099a748bd99bd3ddee3a70999540b1d3076c02ca1353dfac7578e319.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:1172
-
-