Overview
overview
10Static
static
10test3/08b0...8c.exe
windows7-x64
10test3/08b0...8c.exe
windows10-2004-x64
10test3/2e8b...6c.exe
windows7-x64
1test3/2e8b...6c.exe
windows10-2004-x64
1test3/5123...72.exe
windows7-x64
1test3/5123...72.exe
windows10-2004-x64
1test3/9208...80.exe
windows7-x64
1test3/9208...80.exe
windows10-2004-x64
1test3/c599...51.exe
windows7-x64
8test3/c599...51.exe
windows10-2004-x64
8test3/d1ee...9b.exe
windows7-x64
5test3/d1ee...9b.exe
windows10-2004-x64
5test3/d3a4...cd.exe
windows7-x64
1test3/d3a4...cd.exe
windows10-2004-x64
1test3/e0c7...46.exe
windows7-x64
10test3/e0c7...46.exe
windows10-2004-x64
10test3/f7ba...d1.exe
windows7-x64
1test3/f7ba...d1.exe
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2023 07:11
Behavioral task
behavioral1
Sample
test3/08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
test3/08b0baa49485954e408eb2ddc02004b1aa7b451e6f704cf1c914d23f3ac0ee8c.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
test3/2e8bcfb94561e536ee0b378b7a879f1fa0763a309f0566c40772652f0b9ee76c.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
test3/2e8bcfb94561e536ee0b378b7a879f1fa0763a309f0566c40772652f0b9ee76c.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
test3/51239563ac4a295857c2712133b94de88d49a243329d93f643e6b6c8cc6c0d72.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
test3/51239563ac4a295857c2712133b94de88d49a243329d93f643e6b6c8cc6c0d72.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
test3/9208908b0dc676aa1d9f2db46321bd3da597234fbc33790851032bc4d057b280.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
test3/9208908b0dc676aa1d9f2db46321bd3da597234fbc33790851032bc4d057b280.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
test3/c599af32f470f3853d837af004590fb94bd1b4a595b04dfde22f876f9a8ea851.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
test3/c599af32f470f3853d837af004590fb94bd1b4a595b04dfde22f876f9a8ea851.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
test3/d1eeb2ad38249bd944d2dc659a84f7a394652c537f80b59fceb3a2c284c6919b.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
test3/d1eeb2ad38249bd944d2dc659a84f7a394652c537f80b59fceb3a2c284c6919b.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
test3/d3a43a20d2b6c497160bf63fe0dec0e1edf2e4406c9bd0ed5d00ce663fddc4cd.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
test3/d3a43a20d2b6c497160bf63fe0dec0e1edf2e4406c9bd0ed5d00ce663fddc4cd.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
test3/e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
test3/e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
test3/f7ba9ce7513a164ff2cbc3d41721d557a94e2441f22a97297f3308df6804ecd1.exe
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
test3/f7ba9ce7513a164ff2cbc3d41721d557a94e2441f22a97297f3308df6804ecd1.exe
Resource
win10v2004-20220812-en
General
-
Target
test3/e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe
-
Size
2.0MB
-
MD5
13f76fa36fe0847e665d774a6b653348
-
SHA1
303303383a59550e8585df05ebc8c88daf85bc0a
-
SHA256
e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146
-
SHA512
026d39d6dcb019573df2aa1accaa6411de326099b766ee86327befade7f2919a5ef9c98d5ee48959fca71fd9bc8f10704ae6677d61092f534eb55917daea621e
-
SSDEEP
24576:WQC+u0n/0tyoWqGh+pFWYFJ+VQgY2AVSlOQicOc7MXYhmtaibiF674d1:WQRu0n/00qy+poYQYdD5cVL/B67u
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral16/memory/4656-132-0x0000000010000000-0x000000001018D000-memory.dmp family_gh0strat -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\S: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\J: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\I: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\K: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\L: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\N: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\Z: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\F: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\H: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\M: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\P: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\T: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\V: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\W: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\X: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\E: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\Y: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\G: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\O: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\R: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\U: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe File opened (read-only) \??\B: e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe Token: 33 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe Token: SeIncBasePriorityPrivilege 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe Token: 33 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe Token: SeIncBasePriorityPrivilege 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4656 e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\test3\e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe"C:\Users\Admin\AppData\Local\Temp\test3\e0c7e609e4fdcbe12daffb6c0517c4fde9644e8774a0d74139d940fd8ca7e146.exe"1⤵
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4656