Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2023, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
ML7R9U7.exe
Resource
win7-20231023-en
General
-
Target
ML7R9U7.exe
-
Size
359KB
-
MD5
a37556c8cfd7eaba495a318a0de59466
-
SHA1
07707cba7364e130f35eddbcab7702db44e7e671
-
SHA256
08e9d8d7b108683314e5fad199d52b868713807697704f08ddc4b825553cca20
-
SHA512
be38b134da1675a51585787433b8ec98eee5940db103eac5e2e851c65e6050f45b943aa8fe76393f593f7de1a4de0a636327c3f78c3d7a056308fa3a54c08d23
-
SSDEEP
6144:2ZpuZnVB3/nPwArobrJEoXG81WAheOBO77NsHJDi1tPYP6lLaYpPqQ5aSAwz07Au:2ZM13/nPw6ovJE2G8IAheOA7JsH1KtPm
Malware Config
Extracted
gh0strat
27.124.10.162
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/5112-1-0x00000000017F0000-0x000000000181D000-memory.dmp family_gh0strat -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ML7R9U7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ML7R9U7.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3960 regedit.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe 5112 ML7R9U7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3556 5112 ML7R9U7.exe 88 PID 5112 wrote to memory of 3556 5112 ML7R9U7.exe 88 PID 5112 wrote to memory of 3556 5112 ML7R9U7.exe 88 PID 3556 wrote to memory of 3960 3556 cmd.exe 89 PID 3556 wrote to memory of 3960 3556 cmd.exe 89 PID 3556 wrote to memory of 3960 3556 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ML7R9U7.exe"C:\Users\Admin\AppData\Local\Temp\ML7R9U7.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\cmd.execmd /C regedit /s Uac.reg2⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\regedit.exeregedit /s Uac.reg3⤵
- UAC bypass
- Runs .reg file with regedit
PID:3960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245B
MD53259410b95978a44d4a95a1d1815cc6d
SHA126d3928a81f9d754c7991673c6b856652ce38f98
SHA256182d0025f616b82d52f824e52ec21f6f75cb3cba3e31b0f27c1f8d1a6d5aa7b5
SHA51244b7fdec8e4346901cc73927536b9841489b16e1faf4a25e17bb620195b4d0f841c7a5746b4f7a37fc91b7b9606abcb61b662b5732935472064b5eab31ce300b