Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24-03-2023 01:55
Behavioral task
behavioral1
Sample
f1ec2cf6256a7c8543586065a07da47a.exe
Resource
win7-20230220-en
General
-
Target
f1ec2cf6256a7c8543586065a07da47a.exe
-
Size
114KB
-
MD5
f1ec2cf6256a7c8543586065a07da47a
-
SHA1
4b09ea264e9762305f30668fe2ce7fc7999adc2f
-
SHA256
8ad50e2cd339bb8033e62937f73308441bdbe8acf61ad9edd1489eb35f3a2895
-
SHA512
faaa3483ebb0f02d1247788ec6cd41e83ecb3529ffb419b39d63b6068e1db388ffcce7557972f7349481462ffb3e4aba0a5991490163d4d84f84684dc5e3d78a
-
SSDEEP
3072:yyETbqC8r+DfEnMIXRyGcCHwuWWDPD6QbF6sRa:DEyifMXfcCQ+DOpC
Malware Config
Extracted
gh0strat
81.68.216.37
Signatures
-
Gh0st RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-54-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral1/memory/928-65-0x0000000000400000-0x0000000000463000-memory.dmp family_gh0strat behavioral1/memory/1708-64-0x0000000000400000-0x0000000000463000-memory.dmp family_gh0strat behavioral1/memory/1616-72-0x0000000000400000-0x0000000000463000-memory.dmp family_gh0strat -
Processes:
server.exegtthp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gtthp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" gtthp.exe -
Processes:
server.exegtthp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" gtthp.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
Kcyyqug.exeKcyyqug.exeserver.exegtthp.exepid process 928 Kcyyqug.exe 1616 Kcyyqug.exe 2036 server.exe 932 gtthp.exe -
Loads dropped DLL 1 IoCs
Processes:
server.exepid process 2036 server.exe -
Processes:
resource yara_rule C:\Program Files (x86)\Kcyyqug.exe upx behavioral1/memory/928-65-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1708-64-0x0000000000400000-0x0000000000463000-memory.dmp upx C:\Program Files (x86)\Kcyyqug.exe upx C:\Program Files (x86)\Kcyyqug.exe upx behavioral1/memory/1616-72-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Processes:
server.exegtthp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" gtthp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
server.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\gtthp.exe = "C:\\Windows\\WindowsUpdate\\gtthp.exe" server.exe -
Processes:
server.exegtthp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gtthp.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
f1ec2cf6256a7c8543586065a07da47a.exedescription ioc process File opened (read-only) \??\P: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\Q: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\G: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\H: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\I: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\J: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\K: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\B: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\M: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\N: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\U: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\F: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\L: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\V: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\W: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\X: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\E: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\O: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\R: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\S: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\T: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\Y: f1ec2cf6256a7c8543586065a07da47a.exe File opened (read-only) \??\Z: f1ec2cf6256a7c8543586065a07da47a.exe -
Drops file in System32 directory 2 IoCs
Processes:
Kcyyqug.exeKcyyqug.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Kcyyqug.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Kcyyqug.exe -
Drops file in Program Files directory 2 IoCs
Processes:
f1ec2cf6256a7c8543586065a07da47a.exedescription ioc process File created C:\Program Files (x86)\Kcyyqug.exe f1ec2cf6256a7c8543586065a07da47a.exe File opened for modification C:\Program Files (x86)\Kcyyqug.exe f1ec2cf6256a7c8543586065a07da47a.exe -
Drops file in Windows directory 4 IoCs
Processes:
server.exegtthp.exedescription ioc process File created C:\Windows\WindowsUpdate\.temp.fortest server.exe File created C:\Windows\WindowsUpdate\gtthp.exe server.exe File opened for modification C:\Windows\WindowsUpdate\gtthp.exe server.exe File created C:\Windows\WindowsUpdate\.temp.fortest gtthp.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
f1ec2cf6256a7c8543586065a07da47a.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f1ec2cf6256a7c8543586065a07da47a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz f1ec2cf6256a7c8543586065a07da47a.exe -
Modifies data under HKEY_USERS 25 IoCs
Processes:
Kcyyqug.exeKcyyqug.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Kcyyqug.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Kcyyqug.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Kcyyqug.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Kcyyqug.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kcyyqug.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Kcyyqug.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Kcyyqug.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Kcyyqug.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Kcyyqug.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Kcyyqug.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Kcyyqug.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Kcyyqug.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Kcyyqug.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Kcyyqug.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Kcyyqug.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kcyyqug.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Kcyyqug.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Kcyyqug.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Kcyyqug.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kcyyqug.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Kcyyqug.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Kcyyqug.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Kcyyqug.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Kcyyqug.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Kcyyqug.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
f1ec2cf6256a7c8543586065a07da47a.exeKcyyqug.exeKcyyqug.exepid process 1708 f1ec2cf6256a7c8543586065a07da47a.exe 1708 f1ec2cf6256a7c8543586065a07da47a.exe 928 Kcyyqug.exe 928 Kcyyqug.exe 1616 Kcyyqug.exe 1616 Kcyyqug.exe 1708 f1ec2cf6256a7c8543586065a07da47a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
server.exegtthp.exedescription pid process Token: SeBackupPrivilege 2036 server.exe Token: SeBackupPrivilege 932 gtthp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Kcyyqug.exef1ec2cf6256a7c8543586065a07da47a.exeserver.exedescription pid process target process PID 928 wrote to memory of 1616 928 Kcyyqug.exe Kcyyqug.exe PID 928 wrote to memory of 1616 928 Kcyyqug.exe Kcyyqug.exe PID 928 wrote to memory of 1616 928 Kcyyqug.exe Kcyyqug.exe PID 928 wrote to memory of 1616 928 Kcyyqug.exe Kcyyqug.exe PID 1708 wrote to memory of 2036 1708 f1ec2cf6256a7c8543586065a07da47a.exe server.exe PID 1708 wrote to memory of 2036 1708 f1ec2cf6256a7c8543586065a07da47a.exe server.exe PID 1708 wrote to memory of 2036 1708 f1ec2cf6256a7c8543586065a07da47a.exe server.exe PID 1708 wrote to memory of 2036 1708 f1ec2cf6256a7c8543586065a07da47a.exe server.exe PID 2036 wrote to memory of 932 2036 server.exe gtthp.exe PID 2036 wrote to memory of 932 2036 server.exe gtthp.exe PID 2036 wrote to memory of 932 2036 server.exe gtthp.exe PID 2036 wrote to memory of 932 2036 server.exe gtthp.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
gtthp.exeserver.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" gtthp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" server.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gtthp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1ec2cf6256a7c8543586065a07da47a.exe"C:\Users\Admin\AppData\Local\Temp\f1ec2cf6256a7c8543586065a07da47a.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
\??\c:\server.exec:\server.exe2⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2036 -
C:\Windows\WindowsUpdate\gtthp.exeC:\Windows\WindowsUpdate\gtthp.exe3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:932
-
-
-
C:\Program Files (x86)\Kcyyqug.exe"C:\Program Files (x86)\Kcyyqug.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files (x86)\Kcyyqug.exe"C:\Program Files (x86)\Kcyyqug.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1616
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5f1ec2cf6256a7c8543586065a07da47a
SHA14b09ea264e9762305f30668fe2ce7fc7999adc2f
SHA2568ad50e2cd339bb8033e62937f73308441bdbe8acf61ad9edd1489eb35f3a2895
SHA512faaa3483ebb0f02d1247788ec6cd41e83ecb3529ffb419b39d63b6068e1db388ffcce7557972f7349481462ffb3e4aba0a5991490163d4d84f84684dc5e3d78a
-
Filesize
114KB
MD5f1ec2cf6256a7c8543586065a07da47a
SHA14b09ea264e9762305f30668fe2ce7fc7999adc2f
SHA2568ad50e2cd339bb8033e62937f73308441bdbe8acf61ad9edd1489eb35f3a2895
SHA512faaa3483ebb0f02d1247788ec6cd41e83ecb3529ffb419b39d63b6068e1db388ffcce7557972f7349481462ffb3e4aba0a5991490163d4d84f84684dc5e3d78a
-
Filesize
114KB
MD5f1ec2cf6256a7c8543586065a07da47a
SHA14b09ea264e9762305f30668fe2ce7fc7999adc2f
SHA2568ad50e2cd339bb8033e62937f73308441bdbe8acf61ad9edd1489eb35f3a2895
SHA512faaa3483ebb0f02d1247788ec6cd41e83ecb3529ffb419b39d63b6068e1db388ffcce7557972f7349481462ffb3e4aba0a5991490163d4d84f84684dc5e3d78a
-
Filesize
39.1MB
MD570c601a95c3e260727e1c9f697be3a81
SHA17cbcfdb42d5f02ffaf1494f395bfab8637d73e97
SHA2569baf62fa972dbc5ac141c2920288ab89a4a8f86f02c722375be99ff115bd4358
SHA512337df24f28d7420e86e59d315d72a09f88cadb0004fd00a679a6c072067a4320adc92983bfdf2c3b240b1adef2f521baea4228b1fed242f6117eb53ba38ce182
-
Filesize
145KB
MD5faf3c47c4d784d20688a8cfd37198518
SHA170eec20185e813526fa9f08ae37f4b89e3b86907
SHA256ba99e2163f2a673708f5f6f4c8b6ba6e739ec852c25f239b10b1eefcc41d0022
SHA5124e10590aad82ae1d99b9729e628a01cec9e6bbcf5b4852790d135c0fb2154503864a47dfe0a91e2f8f6880c1fcc8fe2a0676ba9a9d1d2e99554cd164c4b8b8c1
-
Filesize
145KB
MD5faf3c47c4d784d20688a8cfd37198518
SHA170eec20185e813526fa9f08ae37f4b89e3b86907
SHA256ba99e2163f2a673708f5f6f4c8b6ba6e739ec852c25f239b10b1eefcc41d0022
SHA5124e10590aad82ae1d99b9729e628a01cec9e6bbcf5b4852790d135c0fb2154503864a47dfe0a91e2f8f6880c1fcc8fe2a0676ba9a9d1d2e99554cd164c4b8b8c1
-
Filesize
145KB
MD5faf3c47c4d784d20688a8cfd37198518
SHA170eec20185e813526fa9f08ae37f4b89e3b86907
SHA256ba99e2163f2a673708f5f6f4c8b6ba6e739ec852c25f239b10b1eefcc41d0022
SHA5124e10590aad82ae1d99b9729e628a01cec9e6bbcf5b4852790d135c0fb2154503864a47dfe0a91e2f8f6880c1fcc8fe2a0676ba9a9d1d2e99554cd164c4b8b8c1
-
Filesize
39.1MB
MD570c601a95c3e260727e1c9f697be3a81
SHA17cbcfdb42d5f02ffaf1494f395bfab8637d73e97
SHA2569baf62fa972dbc5ac141c2920288ab89a4a8f86f02c722375be99ff115bd4358
SHA512337df24f28d7420e86e59d315d72a09f88cadb0004fd00a679a6c072067a4320adc92983bfdf2c3b240b1adef2f521baea4228b1fed242f6117eb53ba38ce182