Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
11L3O67.exe
Resource
win7-20231025-en
General
-
Target
11L3O67.exe
-
Size
3.3MB
-
MD5
55676704ea30ec80782a6fe129ecd07a
-
SHA1
b2935565cc449db1ceb78618f06b145eed7b129f
-
SHA256
add99c5e79d3b6736133c2d0336c8386b7c68ce99839b83208ba3b832e5627ff
-
SHA512
3ceead21394022fd33cbfec8332a67791223d52189d7b383c714662fcb8d2f7354a3070a80219e49840f793402a7726b003bd5a1a9aa77e014c26a6e9c5fcd9c
-
SSDEEP
98304:ZGwl5CrmnosDeIp8ZoctqhBtky7zZ+iDCRDtVCQ4:ZXl5HnoipqkhBtky7zZeRDtZ4
Malware Config
Extracted
gh0strat
27.124.10.162
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4052-1-0x00000000031C0000-0x00000000031ED000-memory.dmp family_gh0strat -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 11L3O67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 11L3O67.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2624 regedit.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe 4052 11L3O67.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4052 wrote to memory of 1240 4052 11L3O67.exe 89 PID 4052 wrote to memory of 1240 4052 11L3O67.exe 89 PID 4052 wrote to memory of 1240 4052 11L3O67.exe 89 PID 1240 wrote to memory of 2624 1240 cmd.exe 91 PID 1240 wrote to memory of 2624 1240 cmd.exe 91 PID 1240 wrote to memory of 2624 1240 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\11L3O67.exe"C:\Users\Admin\AppData\Local\Temp\11L3O67.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\cmd.execmd /C regedit /s Uac.reg2⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\regedit.exeregedit /s Uac.reg3⤵
- UAC bypass
- Runs .reg file with regedit
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245B
MD53259410b95978a44d4a95a1d1815cc6d
SHA126d3928a81f9d754c7991673c6b856652ce38f98
SHA256182d0025f616b82d52f824e52ec21f6f75cb3cba3e31b0f27c1f8d1a6d5aa7b5
SHA51244b7fdec8e4346901cc73927536b9841489b16e1faf4a25e17bb620195b4d0f841c7a5746b4f7a37fc91b7b9606abcb61b662b5732935472064b5eab31ce300b