Analysis
-
max time kernel
149s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-03-2023 12:17
Behavioral task
behavioral1
Sample
0.exe
Resource
win7-20230220-en
General
-
Target
0.exe
-
Size
71KB
-
MD5
2a9d0d06d292a4cbbe4a95da4650ed54
-
SHA1
44c32dfae9ac971c3651adbd82c821971a5400dc
-
SHA256
09a1c17ac55cde962b4f3bcd61140d752d86362296ee74736000a6a647c73d8c
-
SHA512
ed15670a18bffa1c5c1d79f1a5a653d6b2bde649164c955473580321f4ab3d048124c26e1a92e9d8ba0edaf754617d2d2c13d8db92323e09957b6de225b5314d
-
SSDEEP
1536:jWZpTtLcWyeYd4//yEZc1GJf7/QP4uirySj5e:+pZTvnyEZiGJ7/QguiryS5e
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule C:\Windows\FileName.jpg family_gh0strat \??\c:\windows\filename.jpg family_gh0strat C:\1699800.dll family_gh0strat -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1632 svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
0.exedescription ioc process File opened for modification C:\Windows\FileName.jpg 0.exe File created C:\Windows\FileName.jpg 0.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
Processes:
svchost.exepid process 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe 1632 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
0.exedescription pid process Token: SeBackupPrivilege 1988 0.exe Token: SeRestorePrivilege 1988 0.exe Token: SeBackupPrivilege 1988 0.exe Token: SeRestorePrivilege 1988 0.exe Token: SeBackupPrivilege 1988 0.exe Token: SeRestorePrivilege 1988 0.exe Token: SeBackupPrivilege 1988 0.exe Token: SeRestorePrivilege 1988 0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
chrome.exedescription pid process target process PID 840 wrote to memory of 1768 840 chrome.exe chrome.exe PID 840 wrote to memory of 1768 840 chrome.exe chrome.exe PID 840 wrote to memory of 1768 840 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0.exe"C:\Users\Admin\AppData\Local\Temp\0.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6fe9758,0x7fef6fe9768,0x7fef6fe97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1236,i,13762552445179070119,5261218554303562535,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 --field-trial-handle=1236,i,13762552445179070119,5261218554303562535,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\1699800.dllFilesize
64KB
MD545dc749351fd65d71da89ca2ed2766cb
SHA1e080faf81157b7f867cb56938c5e579c206af9b9
SHA256391109432ba2df9f3ebc74e0144f42a490405f7c8ecb51da01b4ce793be72f25
SHA5127e63d8778a4656a19397849a6edb483993f1183257fb8c0793ad4b5c625ed69d1b9472969bac6dfc98938e19baed7e3e61ab80085a1a6edd8a50ca660ce3bf74
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000004.dbtmpFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Windows\FileName.jpgFilesize
98KB
MD5277edc549082862c3c79b1c129b4f4eb
SHA100e41914b99785302544219f9e2e53a383792654
SHA2569f5592753a07afb09502eba5ce125f3893c1050cb181a39de60a608ce5c0643f
SHA512d6db925606a992ef97c3268ea8587bcfba50a558043cd5f9abd4b46c4aae2ed81af2c95e136209271ee1056538ee8f6f31bf1009c83723167ce27b767a73b010
-
\??\c:\NT_Path.jpgFilesize
54B
MD5beeabb43a936b044814f219d7900b5bb
SHA1234b53aa487ab598f89dad2fc2d4b159c0ba7333
SHA256d4f290453d98da1d15250b064146871a4f7d3cfb11fff29bb705e318793ecf15
SHA512f85d7a3e78233a26b4fd543ac6969e251ec073d35c6d73e8b1b705ff7cbc0323e3dcbf47ffbaae514f7c4312ade35c483f162923d10539fdd9942b9fc90d11a3
-
\??\c:\windows\filename.jpgFilesize
98KB
MD5277edc549082862c3c79b1c129b4f4eb
SHA100e41914b99785302544219f9e2e53a383792654
SHA2569f5592753a07afb09502eba5ce125f3893c1050cb181a39de60a608ce5c0643f
SHA512d6db925606a992ef97c3268ea8587bcfba50a558043cd5f9abd4b46c4aae2ed81af2c95e136209271ee1056538ee8f6f31bf1009c83723167ce27b767a73b010
-
memory/624-67-0x0000000000060000-0x0000000000061000-memory.dmpFilesize
4KB