Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
05-11-2023 16:43
Static task
static1
Behavioral task
behavioral1
Sample
fe37f090254ebab9e1a5fefcc7367ac16617e24f8819f31cf07f301adb498677.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
fe37f090254ebab9e1a5fefcc7367ac16617e24f8819f31cf07f301adb498677.dll
Resource
win10v2004-20231023-en
General
-
Target
fe37f090254ebab9e1a5fefcc7367ac16617e24f8819f31cf07f301adb498677.dll
-
Size
2.1MB
-
MD5
af282cb1792f5e49af47dd0052312241
-
SHA1
3880a89bfeaf8eeb1cac5c75d5466ddbbe19e5ab
-
SHA256
fe37f090254ebab9e1a5fefcc7367ac16617e24f8819f31cf07f301adb498677
-
SHA512
e036ece3e7574fc27aec635dfe7e9206cd98de5b1eda969734628d93f3b32e79461288f9adc4e36559fe4bfba77f4724480bf766f973227f9f08962d45fa9c67
-
SSDEEP
49152:xVsHNVFXUhKspt22fq6AFbTj1uj53f/S:DINVFXyKspxqpFbTBsf
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/1492-12-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/1492-13-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/1492-16-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/1492-18-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/1492-28-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2388 rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 1492 svchoat.exe -
Loads dropped DLL 2 IoCs
pid Process 2388 rundll32.exe 2388 rundll32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchoat.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\svchoat.exe rundll32.exe File created C:\Windows\SysWOW64\29DF5D8A svchoat.exe File opened for modification C:\Windows\SysWOW64\29DF5D8A svchoat.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchoat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchoat.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1492 svchoat.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2388 rundll32.exe 2388 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2388 2348 rundll32.exe 28 PID 2348 wrote to memory of 2388 2348 rundll32.exe 28 PID 2348 wrote to memory of 2388 2348 rundll32.exe 28 PID 2348 wrote to memory of 2388 2348 rundll32.exe 28 PID 2348 wrote to memory of 2388 2348 rundll32.exe 28 PID 2348 wrote to memory of 2388 2348 rundll32.exe 28 PID 2348 wrote to memory of 2388 2348 rundll32.exe 28 PID 2388 wrote to memory of 1492 2388 rundll32.exe 29 PID 2388 wrote to memory of 1492 2388 rundll32.exe 29 PID 2388 wrote to memory of 1492 2388 rundll32.exe 29 PID 2388 wrote to memory of 1492 2388 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe37f090254ebab9e1a5fefcc7367ac16617e24f8819f31cf07f301adb498677.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe37f090254ebab9e1a5fefcc7367ac16617e24f8819f31cf07f301adb498677.dll,#12⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\svchoat.exeC:\Windows\SysWOW64\svchoat.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD577df692c66b02de46e4bda5f90a1c284
SHA1cdf332215762be4f2b2db79a6e57a80b4214a573
SHA256cf829e39ff06c2ea9475c9b900f1dc81fea40dfe3a92f0109dbf09f746ba175b
SHA51223c3b58697905bab64480135bc07da01573337dce0bb56b4799a365fc88a576eeaaf2d7037ca8314fa61cfda3a6c514c23ab6a0a4575ebf4fdd8a9c54708c607
-
Filesize
192KB
MD577df692c66b02de46e4bda5f90a1c284
SHA1cdf332215762be4f2b2db79a6e57a80b4214a573
SHA256cf829e39ff06c2ea9475c9b900f1dc81fea40dfe3a92f0109dbf09f746ba175b
SHA51223c3b58697905bab64480135bc07da01573337dce0bb56b4799a365fc88a576eeaaf2d7037ca8314fa61cfda3a6c514c23ab6a0a4575ebf4fdd8a9c54708c607
-
Filesize
192KB
MD577df692c66b02de46e4bda5f90a1c284
SHA1cdf332215762be4f2b2db79a6e57a80b4214a573
SHA256cf829e39ff06c2ea9475c9b900f1dc81fea40dfe3a92f0109dbf09f746ba175b
SHA51223c3b58697905bab64480135bc07da01573337dce0bb56b4799a365fc88a576eeaaf2d7037ca8314fa61cfda3a6c514c23ab6a0a4575ebf4fdd8a9c54708c607
-
Filesize
192KB
MD577df692c66b02de46e4bda5f90a1c284
SHA1cdf332215762be4f2b2db79a6e57a80b4214a573
SHA256cf829e39ff06c2ea9475c9b900f1dc81fea40dfe3a92f0109dbf09f746ba175b
SHA51223c3b58697905bab64480135bc07da01573337dce0bb56b4799a365fc88a576eeaaf2d7037ca8314fa61cfda3a6c514c23ab6a0a4575ebf4fdd8a9c54708c607
-
Filesize
192KB
MD577df692c66b02de46e4bda5f90a1c284
SHA1cdf332215762be4f2b2db79a6e57a80b4214a573
SHA256cf829e39ff06c2ea9475c9b900f1dc81fea40dfe3a92f0109dbf09f746ba175b
SHA51223c3b58697905bab64480135bc07da01573337dce0bb56b4799a365fc88a576eeaaf2d7037ca8314fa61cfda3a6c514c23ab6a0a4575ebf4fdd8a9c54708c607