Analysis
-
max time kernel
91s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 14:57
Behavioral task
behavioral1
Sample
7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe
Resource
win7-20220812-en
General
-
Target
7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe
-
Size
120KB
-
MD5
d6eaeb35723f725e9507660e9f8e4d8c
-
SHA1
66a1fec032e4d6bb335d9bef2fc873e3c204387a
-
SHA256
7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c
-
SHA512
9cb858f52aea3f273b05bbeab60c70cbe669af7d64f4fd68826dc034957858ab6ce75cce23a95df8633069eba1d88f5ceb3930b5b007078a5f99790c2bdb8ab2
-
SSDEEP
3072:0PuFP9wPK9fHwkDygAs8sslc7TSqSz4ty:0QWCHwoQsI0TS
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000022f65-132.dat family_gh0strat behavioral2/files/0x0007000000022f65-133.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 4048 Terms.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies Terms.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 Terms.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 Terms.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE Terms.EXE -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Terms.EXE 7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe File opened for modification C:\Windows\Terms.EXE 7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1812 4048 WerFault.exe 78 -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Terms.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Terms.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Terms.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Terms.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Terms.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Terms.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Terms.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Terms.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1064 7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe 1064 7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe 4048 Terms.EXE 4048 Terms.EXE 1064 7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe 1064 7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4048 Terms.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2748 1064 7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe 79 PID 1064 wrote to memory of 2748 1064 7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe 79 PID 1064 wrote to memory of 2748 1064 7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe"C:\Users\Admin\AppData\Local\Temp\7d1b76e5ffd972da972372d210d4c671f964e3865a2010ff3f5e1f58af3a715c.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\7336.vbs"2⤵PID:2748
-
-
C:\Windows\Terms.EXEC:\Windows\Terms.EXE1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 13002⤵
- Program crash
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4048 -ip 40481⤵PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD5fba54c558346622bc6cab5036402ee2c
SHA1cbf8cdb3536af2ade301b47cce92e7f3c75dccbd
SHA2567b6487f2aa98a09796d2ec8ccd800a239d566380c9d384fc22ddcbc328337bf5
SHA5128340021425e446ef87a050f5d82f3a3b286dab0ba09e55eba65250c2ef327720a712ee505bb3417c9b13cf795efbbd343726e813a90b17075332e96dc73c7fd6
-
Filesize
100.1MB
MD54fe2ebddc8b43db1b67a7d496302b2dc
SHA10b22c9d1ad3893800c8175b739fb635f4f5f64c3
SHA25620ffdcd05df637dbee57b1b18ddf35554cd42497d74da28addc9d52620245fd6
SHA51289fdc3457cc478326c2b2a3d06859f86b487072a39a7f0d39e1c9ec4097539f598e9c6c71618eb0754010294c5aa55a69308f2a301dd62e3b3ed0e3d6a3261cd
-
Filesize
100.1MB
MD54fe2ebddc8b43db1b67a7d496302b2dc
SHA10b22c9d1ad3893800c8175b739fb635f4f5f64c3
SHA25620ffdcd05df637dbee57b1b18ddf35554cd42497d74da28addc9d52620245fd6
SHA51289fdc3457cc478326c2b2a3d06859f86b487072a39a7f0d39e1c9ec4097539f598e9c6c71618eb0754010294c5aa55a69308f2a301dd62e3b3ed0e3d6a3261cd