Analysis
-
max time kernel
170s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 17:28
Behavioral task
behavioral1
Sample
NEAS.0acc837c802111544148c6a78ab9f050_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.0acc837c802111544148c6a78ab9f050_JC.exe
-
Size
196KB
-
MD5
0acc837c802111544148c6a78ab9f050
-
SHA1
6e850d1eb77070cce1f72ec9a4856c406eb9f89a
-
SHA256
79200d33f9dd30f8a15c7957158ca1402cb62a126797f3533cc67b81218f0840
-
SHA512
dc38a56624e37d44afc1ac61be1b540c6c86b5d0214faeceff63ed34a20020bb3e41e1fa2bcda58b32ea36f14595e87779d908675de0ccdd52bcae2e5064b033
-
SSDEEP
3072:s6ixrcYyNNBxIf58d6UuSMhXk22T94oz7vEEZzcEtJO7Ri+lxBvby6MX09:sbANBxIxh0u4TSg7vECzcK07RpPp3
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x000200000002281c-2.dat family_gh0strat behavioral2/files/0x000200000002281c-6.dat family_gh0strat behavioral2/files/0x000b000000023253-11.dat family_gh0strat behavioral2/files/0x000b000000023253-12.dat family_gh0strat behavioral2/files/0x000200000002281c-14.dat family_gh0strat -
Deletes itself 1 IoCs
pid Process 4760 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 4932 NEAS.0acc837c802111544148c6a78ab9f050_JC.exe 4760 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Iefg\Nefghijkl.pic NEAS.0acc837c802111544148c6a78ab9f050_JC.exe File created C:\Program Files (x86)\Iefg\Nefghijkl.pic NEAS.0acc837c802111544148c6a78ab9f050_JC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe 4760 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 4932 NEAS.0acc837c802111544148c6a78ab9f050_JC.exe Token: SeRestorePrivilege 4932 NEAS.0acc837c802111544148c6a78ab9f050_JC.exe Token: SeBackupPrivilege 4932 NEAS.0acc837c802111544148c6a78ab9f050_JC.exe Token: SeRestorePrivilege 4932 NEAS.0acc837c802111544148c6a78ab9f050_JC.exe Token: SeBackupPrivilege 4932 NEAS.0acc837c802111544148c6a78ab9f050_JC.exe Token: SeRestorePrivilege 4932 NEAS.0acc837c802111544148c6a78ab9f050_JC.exe Token: SeBackupPrivilege 4932 NEAS.0acc837c802111544148c6a78ab9f050_JC.exe Token: SeRestorePrivilege 4932 NEAS.0acc837c802111544148c6a78ab9f050_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0acc837c802111544148c6a78ab9f050_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0acc837c802111544148c6a78ab9f050_JC.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4760
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5ade1a0eeeb10d2cc909181aaf217be88
SHA115902ba3709ad0b8ddc7a73b36b4a3e40ecc49c9
SHA2567cab00f628545e45670cc2983749f4de52562c39280447be1fdb4b0dff84bc61
SHA51218ddc4024fca3447df810f9593bba350d845e340d3f3d56dcefd28618116021313f7962174f68de42e7bfc44b3483089f50638456bfdaaaa70f12a08297277b1
-
Filesize
133KB
MD5ade1a0eeeb10d2cc909181aaf217be88
SHA115902ba3709ad0b8ddc7a73b36b4a3e40ecc49c9
SHA2567cab00f628545e45670cc2983749f4de52562c39280447be1fdb4b0dff84bc61
SHA51218ddc4024fca3447df810f9593bba350d845e340d3f3d56dcefd28618116021313f7962174f68de42e7bfc44b3483089f50638456bfdaaaa70f12a08297277b1
-
Filesize
133KB
MD5ade1a0eeeb10d2cc909181aaf217be88
SHA115902ba3709ad0b8ddc7a73b36b4a3e40ecc49c9
SHA2567cab00f628545e45670cc2983749f4de52562c39280447be1fdb4b0dff84bc61
SHA51218ddc4024fca3447df810f9593bba350d845e340d3f3d56dcefd28618116021313f7962174f68de42e7bfc44b3483089f50638456bfdaaaa70f12a08297277b1
-
Filesize
7.6MB
MD50327ce360afc2c31a1b1fae8f5864692
SHA1d63e3b8e3abb2f755664df7bee7261fb9f7be278
SHA256c1dad75e994e3cd8d4ad6ab71cae1fbf52a31165c2c8b797be3121591f7384cd
SHA512d379a2a1f22a62c5932b571560661132e246923dbffc51484f090e17f94d9b9ec074014b91733f67dd54a0de0004b95d3068bdb871b417ba00d2560d6f2dd2ed
-
Filesize
92B
MD5222c1dc09918e373bba4aabebc62fc2f
SHA141b7d4ea3a88b23fadc74b692d50b627986e9296
SHA256f3a2b2c30865c040d624e29a474061fde11d889b261e203bbbb60bbbb41f15e5
SHA512ceb6b7e8ea685be81f86c0a48704e22c20fc112c47df4307c7a6f32717faf40ad4a76473328d6cd5787285ffa7867dda59f768fa39ae0b95ca04d7752d51c423
-
Filesize
7.6MB
MD50327ce360afc2c31a1b1fae8f5864692
SHA1d63e3b8e3abb2f755664df7bee7261fb9f7be278
SHA256c1dad75e994e3cd8d4ad6ab71cae1fbf52a31165c2c8b797be3121591f7384cd
SHA512d379a2a1f22a62c5932b571560661132e246923dbffc51484f090e17f94d9b9ec074014b91733f67dd54a0de0004b95d3068bdb871b417ba00d2560d6f2dd2ed