Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:41
Behavioral task
behavioral1
Sample
05baf7aab411250830c065737320af88.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05baf7aab411250830c065737320af88.exe
Resource
win10v2004-20231215-en
General
-
Target
05baf7aab411250830c065737320af88.exe
-
Size
133KB
-
MD5
05baf7aab411250830c065737320af88
-
SHA1
8039eb60a620e0b275af1e3f742850d846d89947
-
SHA256
45ab670a19a585dd60827262b572c9db7e4413bac9257af9b4b1185df961683d
-
SHA512
7651c1ccb685944533b9cfcee48c85407083dedc6017cf3908249ff0d5fae16a9f6d9b1d7235634d0a5d05c10cca13404a2af8334cac11152f91928d16507072
-
SSDEEP
3072:hUasnnVCKBt2q0nyXUmKR6dWj/RaYJ1h5JRaxs5e5:hUasnnVhBt2qKCUm0bjZxJ1mL
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/memory/2644-0-0x0000000000400000-0x000000000041FEF0-memory.dmp family_gh0strat behavioral2/files/0x000300000001e982-2.dat family_gh0strat behavioral2/memory/2644-3-0x0000000000400000-0x000000000041FEF0-memory.dmp family_gh0strat behavioral2/memory/1876-5-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat behavioral2/memory/2808-7-0x0000000010000000-0x0000000010019000-memory.dmp family_gh0strat -
Blocklisted process makes network request 2 IoCs
flow pid Process 4 2808 rundll32.exe 135 2808 rundll32.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\360svc\Parameters\ServiceDll = "C:\\Windows\\Web\\e57418dkill.dll" 05baf7aab411250830c065737320af88.exe -
Loads dropped DLL 2 IoCs
pid Process 1876 svchost.exe 2808 rundll32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Web 05baf7aab411250830c065737320af88.exe File created C:\Windows\Web\e57418dkill.dll 05baf7aab411250830c065737320af88.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1876 svchost.exe Token: SeDebugPrivilege 2808 rundll32.exe Token: SeDebugPrivilege 2808 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2808 1876 svchost.exe 90 PID 1876 wrote to memory of 2808 1876 svchost.exe 90 PID 1876 wrote to memory of 2808 1876 svchost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\05baf7aab411250830c065737320af88.exe"C:\Users\Admin\AppData\Local\Temp\05baf7aab411250830c065737320af88.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in Windows directory
PID:2644
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\web\e57418dkill.dll wintest2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD53240584a55e127ed2b23384d5df6069c
SHA1c800976ecfe5d919465857606b0a6c9248f9baba
SHA25675289bafd867fb34ec01204afa19631fa0b3e449446ca478657ae8a6c54ddd7a
SHA512cd7ae3fbb63a90be19ea2bb18ca40d91f03c41ed36328e3e1f6de14578541d67fcda48102dd60a1111da7b24601aa04f0c144dbb9dfc776c64e2f14dbfc8f136