Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe
Resource
win7-20231129-en
General
-
Target
668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe
-
Size
5.6MB
-
MD5
0a33a1bfd046c651c8c91edb3d7b972c
-
SHA1
fe93b5f6242be4e5b89c5e2dcd46640b456cd71d
-
SHA256
668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba
-
SHA512
5be38c53d2471c19c15aa1212839cd8bafcf42796977ea7f27daebf9a840af0dcfcdc20b244bf85902d6365d1eed52f8efff0c04cd389bf1a570b6d007d49ad6
-
SSDEEP
98304:GBGw4JTYdg7szAofgIlGE4JmUwMDeQo9vCRxNwimxt2Nv6GAsF7EyZ1pjZBZYZZ0:GBGw4JmqcxgiGE4JiMqF6DChU6AvfjBf
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/memory/1584-111-0x0000000010000000-0x0000000010189000-memory.dmp family_gh0strat behavioral2/memory/1584-110-0x0000000010000000-0x0000000010189000-memory.dmp family_gh0strat behavioral2/memory/1584-112-0x0000000010000000-0x0000000010189000-memory.dmp family_gh0strat behavioral2/memory/1584-114-0x0000000010000000-0x0000000010189000-memory.dmp family_gh0strat behavioral2/memory/1584-122-0x0000000010000000-0x0000000010189000-memory.dmp family_gh0strat -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/3816-95-0x0000000073340000-0x0000000073349000-memory.dmp acprotect behavioral2/files/0x0008000000023151-93.dat acprotect -
Deletes itself 1 IoCs
pid Process 4640 explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1584 PlantsVsZombies.exe -
Loads dropped DLL 6 IoCs
pid Process 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 1584 PlantsVsZombies.exe -
resource yara_rule behavioral2/memory/3816-95-0x0000000073340000-0x0000000073349000-memory.dmp upx behavioral2/files/0x0008000000023151-93.dat upx behavioral2/memory/1584-107-0x0000000010000000-0x0000000010189000-memory.dmp upx behavioral2/memory/1584-111-0x0000000010000000-0x0000000010189000-memory.dmp upx behavioral2/memory/1584-110-0x0000000010000000-0x0000000010189000-memory.dmp upx behavioral2/memory/1584-112-0x0000000010000000-0x0000000010189000-memory.dmp upx behavioral2/memory/1584-114-0x0000000010000000-0x0000000010189000-memory.dmp upx behavioral2/memory/1584-122-0x0000000010000000-0x0000000010189000-memory.dmp upx -
resource yara_rule behavioral2/files/0x0006000000023285-97.dat vmprotect behavioral2/files/0x0006000000023285-98.dat vmprotect behavioral2/memory/1584-100-0x00000000742E0000-0x00000000743CD000-memory.dmp vmprotect behavioral2/memory/1584-99-0x00000000742E0000-0x00000000743CD000-memory.dmp vmprotect behavioral2/memory/1584-105-0x00000000742E0000-0x00000000743CD000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: PlantsVsZombies.exe File opened (read-only) \??\U: PlantsVsZombies.exe File opened (read-only) \??\X: PlantsVsZombies.exe File opened (read-only) \??\J: PlantsVsZombies.exe File opened (read-only) \??\L: PlantsVsZombies.exe File opened (read-only) \??\R: PlantsVsZombies.exe File opened (read-only) \??\O: PlantsVsZombies.exe File opened (read-only) \??\P: PlantsVsZombies.exe File opened (read-only) \??\T: PlantsVsZombies.exe File opened (read-only) \??\V: PlantsVsZombies.exe File opened (read-only) \??\W: PlantsVsZombies.exe File opened (read-only) \??\E: PlantsVsZombies.exe File opened (read-only) \??\I: PlantsVsZombies.exe File opened (read-only) \??\M: PlantsVsZombies.exe File opened (read-only) \??\Z: PlantsVsZombies.exe File opened (read-only) \??\N: PlantsVsZombies.exe File opened (read-only) \??\Q: PlantsVsZombies.exe File opened (read-only) \??\B: PlantsVsZombies.exe File opened (read-only) \??\G: PlantsVsZombies.exe File opened (read-only) \??\K: PlantsVsZombies.exe File opened (read-only) \??\H: PlantsVsZombies.exe File opened (read-only) \??\Y: PlantsVsZombies.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3816 set thread context of 4640 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 92 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\asfasf\PlantsVsZombies.exe 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe File created C:\Program Files (x86)\asfasf\bass.dll 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe File created C:\Program Files (x86)\asfasf\uninst.exe 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 PlantsVsZombies.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz PlantsVsZombies.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe 1584 PlantsVsZombies.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1584 PlantsVsZombies.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1584 PlantsVsZombies.exe Token: SeIncBasePriorityPrivilege 1584 PlantsVsZombies.exe Token: 33 1584 PlantsVsZombies.exe Token: SeIncBasePriorityPrivilege 1584 PlantsVsZombies.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3816 wrote to memory of 1584 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 91 PID 3816 wrote to memory of 1584 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 91 PID 3816 wrote to memory of 1584 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 91 PID 3816 wrote to memory of 4640 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 92 PID 3816 wrote to memory of 4640 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 92 PID 3816 wrote to memory of 4640 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 92 PID 3816 wrote to memory of 4640 3816 668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe"C:\Users\Admin\AppData\Local\Temp\668e7df7c1d1bb5ec520f495c57338e4888a29307c8f4e79e6594609b6bdecba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Program Files (x86)\asfasf\PlantsVsZombies.exe"C:\Program Files (x86)\asfasf\PlantsVsZombies.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe2⤵
- Deletes itself
PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5a8738b3c3d4c6fe4026317a576a1691b
SHA17f71398f5d61073934c6c0002c370acf264a248e
SHA2561ff153a4678c1834aecaa892933e83f20bbd6b293b799a4e1298ce4105337038
SHA5122f449ccfcca863652566491add74e4b293577e4a90fc3e0c3d3297107e9ceb809f95081e29f34bb81b5e3927316bd9eb2496c25e8f8a5a9da4b0a0cc31580bc0
-
Filesize
2.1MB
MD5ed6708f44a7e2b28d844b3f9aee955fd
SHA1a0e2a94f9e677242b023f948661d01d038e76f24
SHA2568d28b3fca22be16e422812364905119dcf2a231d1564148344927584c8c018cc
SHA51260f42f8cb7cedb403e4e6b94ffee268528c416b6e3b4b1d943b2d5743e72b115f6f18442875d8aefda4698ca925011ca2a8c7aec046bfb4884ea24ee7a313e8d
-
Filesize
678KB
MD50948eafedbba6c194b72dba58526413d
SHA12c2e2e2b3fe54aacd21cac03e2c0f2496c1df95d
SHA256f62fcb2a59a7ea41fc3ebc79c844855fa1bc6260a4467a4d00371c0e066bc108
SHA5125a6ff4d99e89962cbe541ffb8eec31d537862133ab1a468074727e04afa6af51afcbe3a152efe56eb2a4398a598d14c793813aae1d7b409cfca955c7bdea6411
-
Filesize
363KB
MD58217a0a493ec1c9326ef7c2553e75908
SHA163b090b4858d762b0aa203693eeff092a3ed9778
SHA256cd5d568e76fd8a4333c9011c8218581d849c3d314117223b3213e59a6fe1c347
SHA512199faad44d5c13e639d7bd24ae94c1525bf2cd01e09fc5de95ff26e422214013196f68b90c74c8611000b2f7fe50b178020ea33f0687bb1d214dc6b8a2729ba2
-
Filesize
42KB
MD523f2a0f91881756076fafe9ebf153fae
SHA1f735820595a59910a8d1a9f455c6eaab76054e47
SHA2567dc15af60f0a7ef4a93d70211008892f2bcfb3c19d5fb3e5d2fe64c27c2499d9
SHA5124adb2582e6b3b89a170cd955642bf8a63957c69efbab15baf6c9efd245638692a9b3377e1d3b4f40ad5577a490be73b72f73c06390db2d3b1246079b59349df8
-
Filesize
5KB
MD5ca8bcdded6b265453cf68bae8bbd0b3a
SHA19dbe872ac53e075c0954c882d034aa009c733092
SHA256299ba97dda721cc9216bda218769eb269a239c8bcf09bd6acc774ff935849184
SHA512a9b19434c35236a049036f0153a5c7184c95249fdb04ef7605484551d40a8aba37462eb617e96301cd4363a324f0282e26179ce4b78973ca43e0a63b4dffb33c
-
Filesize
11KB
MD5553d576d77585b9e3a2819256694e81f
SHA19cbbfeff076d3edc1385be5d8972a3faf0022546
SHA25696975506cfa9563dbdf01e03e8c4450b0ba085d04b204c7ffc372687e426bfc4
SHA512f678d4af21f420df8b845d67bf00982e0a3126904da6467a61b604394fa9a641e1bfcbe73c9ebe9f9e49870ee116e5bdaccd245577a8c328af6047c00c3859b7
-
Filesize
7KB
MD511fa0e8418835a4bc8799095d58c0f43
SHA14e1125bdd1be4162fe59872cf75cb57ab24a73c3
SHA256d3a84536a8b2aac7c7de6eeb072feb1aecf53c58738d314313ea4779080e8788
SHA51256491bbfd7354422f8ae62f4ff19e14d18f503bce6ae4a1e158491d952216ffc84cb57df60f00a0071f03f163f5e31fbd6480aeeeb89d5b5bd83388720575144
-
Filesize
646KB
MD5a36e3a886375a1c1473d77a1f37d24e1
SHA18ba667e1ec2de2ed19919953f433a7b99e3bc413
SHA25621acb9006b8106ef01e5dcbc6d731317414b8a4649d077714860821bf4af8927
SHA512608932a7f269b0967d66714a8d4b9e2b038200caf5cce8ad6e555f8bdd2a09af93dc57aefcfdc5fe38e76526b6c0a1b185ccd604e5f86695e78299044f9b93c9
-
Filesize
166KB
MD5f94ced0f40a82f6828e498377230f041
SHA1bc926b0a2344a82ee6262bfbfe12c54eca6db31a
SHA2567339d2fdfc5d9fa055c8b932c708104a7bf055154062107d51e55da412a49d7e
SHA51231ae5ed3886be569ad9daa1df958228a11d147b09a9f6bfa4193ab13f8be619dc03c46bcaa6e7d5df2f7d9594b55eb7287f43f48d4ef5d03c1648f126c23f631