Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 02:11
Behavioral task
behavioral1
Sample
8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe
-
Size
28KB
-
MD5
4acd2949f151f70aecd79c1246abc66f
-
SHA1
d1ea4c1cd3317e8cae2c6de614b5550544740d59
-
SHA256
8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110
-
SHA512
3871396c2e6246c24331a9f43489dce6134e465ef1d4f295327ab246cedcc05e2c00054e8652112d61a1776b087875a62140976b55136ec36788350da4195fb1
-
SSDEEP
768:fl4zBK6ZAd42oZChNi2+dgw9qRR3GXphR4/Oh5k:fl4V2qChNPKqRR3GpT4/Oh5k
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1952-1-0x0000000000400000-0x000000000042D000-memory.dmp family_gh0strat -
resource yara_rule behavioral1/memory/1952-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1952-1-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1952 8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe 1952 8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeBackupPrivilege 1952 8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe Token: SeSecurityPrivilege 1952 8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe Token: SeSecurityPrivilege 1952 8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe Token: SeBackupPrivilege 1952 8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe Token: SeSecurityPrivilege 1952 8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe Token: SeBackupPrivilege 1952 8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe Token: SeSecurityPrivilege 1952 8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe"C:\Users\Admin\AppData\Local\Temp\8d0d5840eed23ebbb0b98d506cc73b4ce943e69e2f2ebcec56c33ddccab7f110.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952