Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
3618b9794c150076cb82dfa0b95e9caffcb45be8adefc1a8f30014e9e018da4b.exe
Resource
win7-20230831-en
General
-
Target
3618b9794c150076cb82dfa0b95e9caffcb45be8adefc1a8f30014e9e018da4b.exe
-
Size
134KB
-
MD5
9600202e9919aa76d669a8a5115dfeb8
-
SHA1
9bd82a367d94ccf349338f4ae4a266ff600785f0
-
SHA256
3618b9794c150076cb82dfa0b95e9caffcb45be8adefc1a8f30014e9e018da4b
-
SHA512
17905a5ade7a056287a56086411faac570f20721ef56e0d56dafbbba2f478e3e49d1b4e6228d3d62231e7c8f7a58ffa1591b36d67439de2b3430bf4354eed93f
-
SSDEEP
3072:bUD9JxpzoSIP9tKXYPgqtA8+FnH07e9R23RnvU:bUD9JxpzozP6vq+80nU7zR
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3592-6-0x0000000010000000-0x0000000010029000-memory.dmp family_gh0strat -
Loads dropped DLL 1 IoCs
pid Process 3592 RUNDLL32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 444 3592 WerFault.exe 81 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2588 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3592 2276 3618b9794c150076cb82dfa0b95e9caffcb45be8adefc1a8f30014e9e018da4b.exe 81 PID 2276 wrote to memory of 3592 2276 3618b9794c150076cb82dfa0b95e9caffcb45be8adefc1a8f30014e9e018da4b.exe 81 PID 2276 wrote to memory of 3592 2276 3618b9794c150076cb82dfa0b95e9caffcb45be8adefc1a8f30014e9e018da4b.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\3618b9794c150076cb82dfa0b95e9caffcb45be8adefc1a8f30014e9e018da4b.exe"C:\Users\Admin\AppData\Local\Temp\3618b9794c150076cb82dfa0b95e9caffcb45be8adefc1a8f30014e9e018da4b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\RUNDLL32.exeRUNDLL32 "C:\Windows\Temp\yydsamingfack.fff" main2⤵
- Loads dropped DLL
PID:3592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 5963⤵
- Program crash
PID:444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3592 -ip 35921⤵PID:4404
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2080
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2588
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5cf6eb41c42d173427b7305b21ba4e655
SHA11ad2586df0b1a5d0d3c1cf7b0a463236e4ea8e1d
SHA2561d297ec4b48c513a2632d8395c3df476a914c1e2732e8b830731493481ba0054
SHA5122d7b2b64c056855202ab52ca3bb7301787659cd3131b7793c7c02a246d257e01dfdc15573bc3732b383778ad01ab65cfaeb05b9a8e7bc547dd7c8de7529a71ab
-
Filesize
80KB
MD5cf6eb41c42d173427b7305b21ba4e655
SHA11ad2586df0b1a5d0d3c1cf7b0a463236e4ea8e1d
SHA2561d297ec4b48c513a2632d8395c3df476a914c1e2732e8b830731493481ba0054
SHA5122d7b2b64c056855202ab52ca3bb7301787659cd3131b7793c7c02a246d257e01dfdc15573bc3732b383778ad01ab65cfaeb05b9a8e7bc547dd7c8de7529a71ab