Analysis
-
max time kernel
134s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe
Resource
win7-20231129-en
General
-
Target
668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe
-
Size
5.6MB
-
MD5
0a33a1bfd046c651c8c91edb3d7b972c
-
SHA1
fe93b5f6242be4e5b89c5e2dcd46640b456cd71d
-
SHA256
668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba
-
SHA512
5be38c53d2471c19c15aa1212839cd8bafcf42796977ea7f27daebf9a840af0dcfcdc20b244bf85902d6365d1eed52f8efff0c04cd389bf1a570b6d007d49ad6
-
SSDEEP
98304:GBGw4JTYdg7szAofgIlGE4JmUwMDeQo9vCRxNwimxt2Nv6GAsF7EyZ1pjZBZYZZ0:GBGw4JmqcxgiGE4JiMqF6DChU6AvfjBf
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2424-123-0x0000000010000000-0x0000000010189000-memory.dmp family_gh0strat behavioral1/memory/2424-121-0x0000000010000000-0x0000000010189000-memory.dmp family_gh0strat behavioral1/memory/2424-125-0x0000000010000000-0x0000000010189000-memory.dmp family_gh0strat behavioral1/memory/2424-120-0x0000000010000000-0x0000000010189000-memory.dmp family_gh0strat behavioral1/memory/2424-136-0x0000000010000000-0x0000000010189000-memory.dmp family_gh0strat -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00060000000192f0-99.dat acprotect -
Deletes itself 1 IoCs
pid Process 1500 explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2424 PlantsVsZombies.exe -
Loads dropped DLL 7 IoCs
pid Process 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 2424 PlantsVsZombies.exe -
resource yara_rule behavioral1/files/0x00060000000192f0-99.dat upx behavioral1/memory/2424-117-0x0000000010000000-0x0000000010189000-memory.dmp upx behavioral1/memory/2424-123-0x0000000010000000-0x0000000010189000-memory.dmp upx behavioral1/memory/2424-121-0x0000000010000000-0x0000000010189000-memory.dmp upx behavioral1/memory/2424-125-0x0000000010000000-0x0000000010189000-memory.dmp upx behavioral1/memory/2424-120-0x0000000010000000-0x0000000010189000-memory.dmp upx behavioral1/memory/2424-136-0x0000000010000000-0x0000000010189000-memory.dmp upx -
resource yara_rule behavioral1/files/0x00050000000192d8-109.dat vmprotect behavioral1/memory/2424-111-0x0000000074260000-0x000000007434D000-memory.dmp vmprotect behavioral1/memory/2424-110-0x0000000074260000-0x000000007434D000-memory.dmp vmprotect behavioral1/files/0x00050000000192d8-108.dat vmprotect behavioral1/memory/2424-135-0x0000000074260000-0x000000007434D000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: PlantsVsZombies.exe File opened (read-only) \??\U: PlantsVsZombies.exe File opened (read-only) \??\X: PlantsVsZombies.exe File opened (read-only) \??\H: PlantsVsZombies.exe File opened (read-only) \??\L: PlantsVsZombies.exe File opened (read-only) \??\O: PlantsVsZombies.exe File opened (read-only) \??\Q: PlantsVsZombies.exe File opened (read-only) \??\S: PlantsVsZombies.exe File opened (read-only) \??\B: PlantsVsZombies.exe File opened (read-only) \??\T: PlantsVsZombies.exe File opened (read-only) \??\W: PlantsVsZombies.exe File opened (read-only) \??\Y: PlantsVsZombies.exe File opened (read-only) \??\P: PlantsVsZombies.exe File opened (read-only) \??\R: PlantsVsZombies.exe File opened (read-only) \??\E: PlantsVsZombies.exe File opened (read-only) \??\G: PlantsVsZombies.exe File opened (read-only) \??\J: PlantsVsZombies.exe File opened (read-only) \??\K: PlantsVsZombies.exe File opened (read-only) \??\M: PlantsVsZombies.exe File opened (read-only) \??\N: PlantsVsZombies.exe File opened (read-only) \??\V: PlantsVsZombies.exe File opened (read-only) \??\Z: PlantsVsZombies.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 1500 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 28 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\asfasf\PlantsVsZombies.exe 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe File created C:\Program Files (x86)\asfasf\bass.dll 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe File created C:\Program Files (x86)\asfasf\uninst.exe 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 PlantsVsZombies.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz PlantsVsZombies.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe 2424 PlantsVsZombies.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2424 PlantsVsZombies.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2424 PlantsVsZombies.exe Token: SeIncBasePriorityPrivilege 2424 PlantsVsZombies.exe Token: 33 2424 PlantsVsZombies.exe Token: SeIncBasePriorityPrivilege 2424 PlantsVsZombies.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2424 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 29 PID 2372 wrote to memory of 2424 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 29 PID 2372 wrote to memory of 2424 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 29 PID 2372 wrote to memory of 2424 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 29 PID 2372 wrote to memory of 2424 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 29 PID 2372 wrote to memory of 2424 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 29 PID 2372 wrote to memory of 2424 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 29 PID 2372 wrote to memory of 1500 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 28 PID 2372 wrote to memory of 1500 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 28 PID 2372 wrote to memory of 1500 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 28 PID 2372 wrote to memory of 1500 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 28 PID 2372 wrote to memory of 1500 2372 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe"C:\Users\Admin\AppData\Local\Temp\668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe2⤵
- Deletes itself
PID:1500
-
-
C:\Program Files (x86)\asfasf\PlantsVsZombies.exe"C:\Program Files (x86)\asfasf\PlantsVsZombies.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a66cffc96645d79c73d2b240158f7277
SHA10938d84bc98acc301e02dd95ec244d05f40e1287
SHA256ebc55cc7f5f8b5e0dbd81dd50cce8b42f6007cc33c5e722bef398ea6d0b6996e
SHA512e442fe6fc6708a323bc5158e3ba86aaf9e6dccd5ea43acfa34f97ae1e021a9111b38147641161d4b233426fbcb47931dcde924f9b5666ec347487b9b3a0c5b13
-
Filesize
238KB
MD5cb4e2e1f2524d55531c4975ed6335156
SHA109824664ff6c3afae28f39fade417f780b873be5
SHA2566490c22ac196715713fb22e6451fc7f573f5ed3428cf92e2c9c52e2ebaa643d8
SHA5128b815f6aa4de413b93190fcfb40315f9da3479335b46d924a39448bbe623ca459cd49243d6c170995531e89f9897bc5d59913bac48b3204a65811daf3dd9bc5d
-
Filesize
42KB
MD523f2a0f91881756076fafe9ebf153fae
SHA1f735820595a59910a8d1a9f455c6eaab76054e47
SHA2567dc15af60f0a7ef4a93d70211008892f2bcfb3c19d5fb3e5d2fe64c27c2499d9
SHA5124adb2582e6b3b89a170cd955642bf8a63957c69efbab15baf6c9efd245638692a9b3377e1d3b4f40ad5577a490be73b72f73c06390db2d3b1246079b59349df8
-
Filesize
7KB
MD511fa0e8418835a4bc8799095d58c0f43
SHA14e1125bdd1be4162fe59872cf75cb57ab24a73c3
SHA256d3a84536a8b2aac7c7de6eeb072feb1aecf53c58738d314313ea4779080e8788
SHA51256491bbfd7354422f8ae62f4ff19e14d18f503bce6ae4a1e158491d952216ffc84cb57df60f00a0071f03f163f5e31fbd6480aeeeb89d5b5bd83388720575144
-
Filesize
191KB
MD5b46e715a17523c95e90f45a9a9485653
SHA13674609e1fa4b4374eab67b3a0955610f1bc1cef
SHA25601d6775e7531d73070336af3594192ef8b446e093789777081282bf595a805f3
SHA512cce153b6e6dda3c884da71d345eeb0963e8ae54cfde57f38193cb38a9b8953533711e5384e7ce5919e1b3152f20173bf8d32effbc6b1726fecf08ea1f4eccd50
-
Filesize
136KB
MD5b50c1e76fde17b21c947fea92f907d52
SHA1de261d3fb93a7d049a5886ae5617292a5f7ab8db
SHA25619b9ca949730cdee3e047dd9033d490993417c428065c1c3497224e8f6a24b85
SHA51277ca60c8d6184d0c96a358e19caeb0a1a5cb35c202b33b5fed6cf52d828846119ffd647700b0793e1c35bee21418ad5055e20e2fba27875484246b1ae60fbaff
-
Filesize
171KB
MD5205847a4d7fbeceeab235efee438ec6f
SHA19dbb60d7d9091d8aa2f3fe2bf3cc04ae620ca90c
SHA256b65740708035df76c572f62878126fe4bc6556bd597b7d878b1bd4af3e06ab9e
SHA51254de8ac627ea91892f66afe524e99f3943c67297c7a71d1315b9e8b9eb080d5b99aa0109dc4fe123abd1eef7af45c96dce4bcfffac95b6119167c32d1135cc9d
-
Filesize
272KB
MD55866760637d833c54101f7b114d28b55
SHA1234c7c8e189e6b2555b517e91407e1203f385d10
SHA2567b37983edd5b0a2562ad3d9333e9792d92661acd4992c732f0cad69706db422c
SHA51266889dfe39ad693968b10fb845b823bfc8f6f191cd99671eeff2485cfd1bdefc8285138ac4d83aea3133c26561db11bbcb5a481530f6b1156c4a4bb0b6df9b12
-
Filesize
5KB
MD5ca8bcdded6b265453cf68bae8bbd0b3a
SHA19dbe872ac53e075c0954c882d034aa009c733092
SHA256299ba97dda721cc9216bda218769eb269a239c8bcf09bd6acc774ff935849184
SHA512a9b19434c35236a049036f0153a5c7184c95249fdb04ef7605484551d40a8aba37462eb617e96301cd4363a324f0282e26179ce4b78973ca43e0a63b4dffb33c
-
Filesize
11KB
MD5553d576d77585b9e3a2819256694e81f
SHA19cbbfeff076d3edc1385be5d8972a3faf0022546
SHA25696975506cfa9563dbdf01e03e8c4450b0ba085d04b204c7ffc372687e426bfc4
SHA512f678d4af21f420df8b845d67bf00982e0a3126904da6467a61b604394fa9a641e1bfcbe73c9ebe9f9e49870ee116e5bdaccd245577a8c328af6047c00c3859b7
-
Filesize
646KB
MD5a36e3a886375a1c1473d77a1f37d24e1
SHA18ba667e1ec2de2ed19919953f433a7b99e3bc413
SHA25621acb9006b8106ef01e5dcbc6d731317414b8a4649d077714860821bf4af8927
SHA512608932a7f269b0967d66714a8d4b9e2b038200caf5cce8ad6e555f8bdd2a09af93dc57aefcfdc5fe38e76526b6c0a1b185ccd604e5f86695e78299044f9b93c9
-
Filesize
113KB
MD58329c5597faf5e6b1dbfb839c7575b80
SHA169f3863fe8c0e921f1b99ba22fdf53e880f3947b
SHA256cd8bb1c046a0fb15ec92600bb65ef265931ee4e6ec3cd9f496a97c7201cb09a6
SHA51249ba91b35f7c088f97dbfb90a2c757d81d0f0d569e3f30d4f1278c5f13eb3b1516c191c1f512788fb6ebe770adab8128820bb6422bc314591160902894fc2d97