Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31-08-2023 12:57
Static task
static1
Behavioral task
behavioral1
Sample
bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe
Resource
win7-20230712-en
General
-
Target
bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe
-
Size
2.3MB
-
MD5
0d004b7cca6b78d29c628532127754e9
-
SHA1
3fdb73a40f075e33aaf18008b35be817c10b9977
-
SHA256
bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb
-
SHA512
450fcd7863ca9ea6c02ed6181a547a32bb08124079c7b2dccd62ca71bf564e22d7ed0fd23f4c77bbd34b462d027fff452a9e1dc11cc4b0a146d388207b7f88d7
-
SSDEEP
49152:QAR6pHImCXi45lSevpEie7zoQY49aXZmMAXh4plixja8dTeJPlXmB+giUS:QwI7Wl5Yei1ox49unmJZa8d6JPlXDgiz
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/3024-20-0x0000000010000000-0x000000001018B000-memory.dmp family_gh0strat behavioral1/memory/3024-30-0x0000000000400000-0x000000000063C000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2824 sg.tmp 3024 wininit.exe -
Loads dropped DLL 3 IoCs
pid Process 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: wininit.exe File opened (read-only) \??\T: wininit.exe File opened (read-only) \??\Z: wininit.exe File opened (read-only) \??\E: wininit.exe File opened (read-only) \??\H: wininit.exe File opened (read-only) \??\I: wininit.exe File opened (read-only) \??\K: wininit.exe File opened (read-only) \??\R: wininit.exe File opened (read-only) \??\V: wininit.exe File opened (read-only) \??\Y: wininit.exe File opened (read-only) \??\B: wininit.exe File opened (read-only) \??\M: wininit.exe File opened (read-only) \??\O: wininit.exe File opened (read-only) \??\P: wininit.exe File opened (read-only) \??\X: wininit.exe File opened (read-only) \??\G: wininit.exe File opened (read-only) \??\J: wininit.exe File opened (read-only) \??\U: wininit.exe File opened (read-only) \??\W: wininit.exe File opened (read-only) \??\N: wininit.exe File opened (read-only) \??\Q: wininit.exe File opened (read-only) \??\S: wininit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wininit.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wininit.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe 3024 wininit.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeBackupPrivilege 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe Token: SeRestorePrivilege 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe Token: 33 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe Token: SeIncBasePriorityPrivilege 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe Token: 33 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe Token: SeIncBasePriorityPrivilege 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe Token: 33 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe Token: SeIncBasePriorityPrivilege 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe Token: SeRestorePrivilege 2824 sg.tmp Token: 35 2824 sg.tmp Token: SeSecurityPrivilege 2824 sg.tmp Token: SeSecurityPrivilege 2824 sg.tmp Token: 33 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe Token: SeIncBasePriorityPrivilege 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2632 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 28 PID 2316 wrote to memory of 2632 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 28 PID 2316 wrote to memory of 2632 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 28 PID 2316 wrote to memory of 2632 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 28 PID 2316 wrote to memory of 2824 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 30 PID 2316 wrote to memory of 2824 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 30 PID 2316 wrote to memory of 2824 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 30 PID 2316 wrote to memory of 2824 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 30 PID 2316 wrote to memory of 3024 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 32 PID 2316 wrote to memory of 3024 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 32 PID 2316 wrote to memory of 3024 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 32 PID 2316 wrote to memory of 3024 2316 bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe"C:\Users\Admin\AppData\Local\Temp\bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\cmd.execmd.exe /c set2⤵PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\~3033728207270814775~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\~4150941742143186784"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\~4150941742143186784\wininit.exe"C:\Users\Admin\AppData\Local\Temp\~4150941742143186784\wininit.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
1.0MB
MD59c721b69789898a419d8186f34c87bb7
SHA154d92bc23c738a23319d2dd4ed7f81af54dc5791
SHA2563b90af072c31d14ef08f4b18faa18841aee45a21e0c6186369ad7a0faf3d98c5
SHA512646cc1e1f21363941d85a4935bb1e58d1f729ca9f67f180c35f638cdaecdc27aa17e5b7c693ba0ee481fed125df89f8620c37f70ac16d32c3ca6fb8963b4f0ae
-
Filesize
1.0MB
MD59c721b69789898a419d8186f34c87bb7
SHA154d92bc23c738a23319d2dd4ed7f81af54dc5791
SHA2563b90af072c31d14ef08f4b18faa18841aee45a21e0c6186369ad7a0faf3d98c5
SHA512646cc1e1f21363941d85a4935bb1e58d1f729ca9f67f180c35f638cdaecdc27aa17e5b7c693ba0ee481fed125df89f8620c37f70ac16d32c3ca6fb8963b4f0ae
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
1.0MB
MD59c721b69789898a419d8186f34c87bb7
SHA154d92bc23c738a23319d2dd4ed7f81af54dc5791
SHA2563b90af072c31d14ef08f4b18faa18841aee45a21e0c6186369ad7a0faf3d98c5
SHA512646cc1e1f21363941d85a4935bb1e58d1f729ca9f67f180c35f638cdaecdc27aa17e5b7c693ba0ee481fed125df89f8620c37f70ac16d32c3ca6fb8963b4f0ae
-
Filesize
1.0MB
MD59c721b69789898a419d8186f34c87bb7
SHA154d92bc23c738a23319d2dd4ed7f81af54dc5791
SHA2563b90af072c31d14ef08f4b18faa18841aee45a21e0c6186369ad7a0faf3d98c5
SHA512646cc1e1f21363941d85a4935bb1e58d1f729ca9f67f180c35f638cdaecdc27aa17e5b7c693ba0ee481fed125df89f8620c37f70ac16d32c3ca6fb8963b4f0ae