Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
0afaeef479f93bdc60bb639b18f60eca.exe
Resource
win7-20231215-en
General
-
Target
0afaeef479f93bdc60bb639b18f60eca.exe
-
Size
95KB
-
MD5
0afaeef479f93bdc60bb639b18f60eca
-
SHA1
6e3c3d58bf88f80242c720c66fb93115e138724a
-
SHA256
49bf9b104775088fe07e2f26ced8367189952df95575ad244a15fc593190f775
-
SHA512
1718225859f9ed5b92c08e9664e7fca9b08f2047bf85e9dc2e32f230318dd56f297508c93adc1cf269b5371c985994b029d74e418091cf563d5810e964ce5d06
-
SSDEEP
1536:KFFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8pr9bwLFk0D6A:KLS4jHS8q/3nTzePCwNUh4E92Fk0uA
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x0007000000023200-14.dat family_gh0strat behavioral2/files/0x0007000000023200-15.dat family_gh0strat behavioral2/memory/644-16-0x0000000000400000-0x000000000044E5F0-memory.dmp family_gh0strat behavioral2/files/0x0007000000023200-19.dat family_gh0strat -
Deletes itself 1 IoCs
pid Process 644 ldqdxhbmsw -
Executes dropped EXE 1 IoCs
pid Process 644 ldqdxhbmsw -
Loads dropped DLL 3 IoCs
pid Process 1864 svchost.exe 3340 svchost.exe 1408 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\hxvybnydgy svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\hhjrjqbbtt svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\hhjrjqbbtt svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4780 1864 WerFault.exe 96 4032 3340 WerFault.exe 100 4512 1408 WerFault.exe 103 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 644 ldqdxhbmsw 644 ldqdxhbmsw -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 644 ldqdxhbmsw Token: SeBackupPrivilege 644 ldqdxhbmsw Token: SeBackupPrivilege 644 ldqdxhbmsw Token: SeRestorePrivilege 644 ldqdxhbmsw Token: SeBackupPrivilege 1864 svchost.exe Token: SeRestorePrivilege 1864 svchost.exe Token: SeBackupPrivilege 1864 svchost.exe Token: SeBackupPrivilege 1864 svchost.exe Token: SeSecurityPrivilege 1864 svchost.exe Token: SeSecurityPrivilege 1864 svchost.exe Token: SeBackupPrivilege 1864 svchost.exe Token: SeBackupPrivilege 1864 svchost.exe Token: SeSecurityPrivilege 1864 svchost.exe Token: SeBackupPrivilege 1864 svchost.exe Token: SeBackupPrivilege 1864 svchost.exe Token: SeSecurityPrivilege 1864 svchost.exe Token: SeBackupPrivilege 1864 svchost.exe Token: SeRestorePrivilege 1864 svchost.exe Token: SeBackupPrivilege 3340 svchost.exe Token: SeRestorePrivilege 3340 svchost.exe Token: SeBackupPrivilege 3340 svchost.exe Token: SeBackupPrivilege 3340 svchost.exe Token: SeSecurityPrivilege 3340 svchost.exe Token: SeSecurityPrivilege 3340 svchost.exe Token: SeBackupPrivilege 3340 svchost.exe Token: SeBackupPrivilege 3340 svchost.exe Token: SeSecurityPrivilege 3340 svchost.exe Token: SeBackupPrivilege 3340 svchost.exe Token: SeBackupPrivilege 3340 svchost.exe Token: SeSecurityPrivilege 3340 svchost.exe Token: SeBackupPrivilege 3340 svchost.exe Token: SeRestorePrivilege 3340 svchost.exe Token: SeBackupPrivilege 1408 svchost.exe Token: SeRestorePrivilege 1408 svchost.exe Token: SeBackupPrivilege 1408 svchost.exe Token: SeBackupPrivilege 1408 svchost.exe Token: SeSecurityPrivilege 1408 svchost.exe Token: SeSecurityPrivilege 1408 svchost.exe Token: SeBackupPrivilege 1408 svchost.exe Token: SeBackupPrivilege 1408 svchost.exe Token: SeSecurityPrivilege 1408 svchost.exe Token: SeBackupPrivilege 1408 svchost.exe Token: SeBackupPrivilege 1408 svchost.exe Token: SeSecurityPrivilege 1408 svchost.exe Token: SeBackupPrivilege 1408 svchost.exe Token: SeRestorePrivilege 1408 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4456 wrote to memory of 644 4456 0afaeef479f93bdc60bb639b18f60eca.exe 91 PID 4456 wrote to memory of 644 4456 0afaeef479f93bdc60bb639b18f60eca.exe 91 PID 4456 wrote to memory of 644 4456 0afaeef479f93bdc60bb639b18f60eca.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0afaeef479f93bdc60bb639b18f60eca.exe"C:\Users\Admin\AppData\Local\Temp\0afaeef479f93bdc60bb639b18f60eca.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
\??\c:\users\admin\appdata\local\ldqdxhbmsw"C:\Users\Admin\AppData\Local\Temp\0afaeef479f93bdc60bb639b18f60eca.exe" a -sc:\users\admin\appdata\local\temp\0afaeef479f93bdc60bb639b18f60eca.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 7762⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1864 -ip 18641⤵PID:4416
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 9442⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3340 -ip 33401⤵PID:5064
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 9482⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1408 -ip 14081⤵PID:692
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c0abf1470c8b39d710fc1d950e53db56
SHA1e0de3ff7e8bc4d0d49b83876880247e417840d66
SHA2560af39471bf190808cdbe7ec4824d9018d888f417b98282ef4c0852630adea84f
SHA512f2116bb85bce1815cd6cbe61a0a1ee4312e2ba77d0f738da679436e2b0607e786919d31faa5a87d28bcf03c5047b2be8446cd2212e422f057d025ccd5ade851d
-
Filesize
92KB
MD5efa2b4b135a3e54b71caa41e42a2cb11
SHA1afd1c75ba362a468dffa53e076574e9c7b8b641f
SHA2565f53e55dc05baad6a5ebd84b92aa53bde495093b410635dc6228df318bfc05ec
SHA5126d42518ba2eed656a7ccd1d1867a58b36a3e45647d9d7842f0a89843ad4a10c9ff28037d8cc02e0abedf9d459bda9e8d44f9ca8add1e506a60c9b262983f2f28
-
Filesize
2.8MB
MD50b46c9613aad9e42c03e9729ef473f7d
SHA1d6b6ef89b49aec504b6547918dd7953df96229ef
SHA256e32a48749b4f9c0c8d0da6de1cec138f6bdc5f54c64f9ca8b3a6c0ccbd20df49
SHA5121051005a6e42190a27628d2af17e59d24dce1850a85874386dab24a40b6c1a4e7398d6202595ccf5fa5197c42d9dd9cd6433bb0466c048d932d5022da6a396cf
-
Filesize
1.4MB
MD515ed0d35eadb752b834877f5ec350b24
SHA1330c7e205e9f940303c187ae2656bda94529970c
SHA256d7757f627b66ada726521faffb71cee260a54f49a1a2c8f5bc7e250d55c6c0b8
SHA51272370be5ea461e986b1695d118d7b79e9cc334ef10cda4461065c3ec14f2a146f4a5eebc9b8bc22c12dbf817091a660ae66c85f4efcdbf5eef03249812bae072
-
Filesize
1.8MB
MD599b570115f9df8b3955090731a5ffb23
SHA18902591f0ae347c679b3aa1fae0e19de42080a71
SHA2562940a80efc073b4a6e478d88a0f596978deb26b908b8feef0aa4ee7f00c77fc3
SHA5127652ba2628804d76f9d051f55b4ef6704839cc6ef6280717c1a5c0386dca886f571fe8f4f0605fcdc08485f4031022c05730d96da32a847600c7c469ddc36251