Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2023 08:05
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp.exe
-
Size
188KB
-
MD5
1f3eff47818b6c31bf220154c0fdee12
-
SHA1
26772f42ff36dc47e4aed1f7bbb4b0e331978410
-
SHA256
bff74dc434e208598c2ba484341c6275eaeaa87992043f936e8915bde97b94a2
-
SHA512
8d49c5a8e8885a359732bfef5805f57e981aa16a624756f0c37287ef2a5ecd7b9932633c217e9f3bdb1d317317a6118cfced97afe268a7f72272f08726c5ac12
-
SSDEEP
3072:IWTDNVSbckR+z7uHVuoHsvmhtfwrHY52Lr0l7STUyg5f0oDAAt02un3:nvSbckA2VuisvmPOzptg5BA5p3
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/984-133-0x0000000006D10000-0x0000000006D5E000-memory.dmp family_gh0strat behavioral2/memory/984-134-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat -
Modifies RDP port number used by Windows 1 TTPs
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 640 vlc.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe 984 tmp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 640 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1752 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1752 AUDIODG.EXE Token: 33 640 vlc.exe Token: SeIncBasePriorityPrivilege 640 vlc.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 984 tmp.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe 640 vlc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 984 wrote to memory of 640 984 tmp.exe 83 PID 984 wrote to memory of 640 984 tmp.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file c:\IMG_0050.MOV2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:640
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f0 0x4b41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD565b738f038962f076c94dee1f8b7db92
SHA141196bd05f89582c812e551dcde3ba6221e99c63
SHA256628790c3dcd300d5934193a09323986a585bf60f8b8f9561812ce1977c6ce12c
SHA5123bb978b6030c5d2c1d8303696cfbdb0c70230082876c804cd996a75faabb4cb8c58eeb7ab186df9bae8f396d5f59d45a4b33614c6b74f62827df082e9d5df5d3