Analysis
-
max time kernel
36s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 18:32
Static task
static1
Behavioral task
behavioral1
Sample
34c2d37434cb06c2874a49419d59ab45.exe
Resource
win7-20231215-en
General
-
Target
34c2d37434cb06c2874a49419d59ab45.exe
-
Size
228KB
-
MD5
34c2d37434cb06c2874a49419d59ab45
-
SHA1
262fdec6d7ce86ddf2fbf35ec0fa466522bd9428
-
SHA256
48de6adcb1e991d01fde17b73ec8e5441644e08065ff224bbd53dfbdf51d19d5
-
SHA512
ab355b7eebbe651ad4681a89d8e46b0ec02eb1940a7110323a04a091dd439b3b888c86f7a88ecbc0ff8581e4340b54b670b318eec5d748bd8d89c923bc7df516
-
SSDEEP
6144:93ouBn5oP8qxFrthTZW2665Qu46uYF4gK4:7Bn5oP8qxFrXv665Qu46uYe
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/3028-18-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/3064-35-0x0000000000400000-0x0000000000438484-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 2592 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3028 appapp.exe -
Loads dropped DLL 6 IoCs
pid Process 3064 34c2d37434cb06c2874a49419d59ab45.exe 3064 34c2d37434cb06c2874a49419d59ab45.exe 3028 appapp.exe 3028 appapp.exe 3028 appapp.exe 3028 appapp.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 appapp.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\brilgrwjgksojrwmspk.vbs 34c2d37434cb06c2874a49419d59ab45.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2564 sc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 appapp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz appapp.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3064 34c2d37434cb06c2874a49419d59ab45.exe 3064 34c2d37434cb06c2874a49419d59ab45.exe 3064 34c2d37434cb06c2874a49419d59ab45.exe 3028 appapp.exe 3028 appapp.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3028 3064 34c2d37434cb06c2874a49419d59ab45.exe 29 PID 3064 wrote to memory of 3028 3064 34c2d37434cb06c2874a49419d59ab45.exe 29 PID 3064 wrote to memory of 3028 3064 34c2d37434cb06c2874a49419d59ab45.exe 29 PID 3064 wrote to memory of 3028 3064 34c2d37434cb06c2874a49419d59ab45.exe 29 PID 3064 wrote to memory of 3028 3064 34c2d37434cb06c2874a49419d59ab45.exe 29 PID 3064 wrote to memory of 3028 3064 34c2d37434cb06c2874a49419d59ab45.exe 29 PID 3064 wrote to memory of 3028 3064 34c2d37434cb06c2874a49419d59ab45.exe 29 PID 3064 wrote to memory of 2708 3064 34c2d37434cb06c2874a49419d59ab45.exe 43 PID 3064 wrote to memory of 2708 3064 34c2d37434cb06c2874a49419d59ab45.exe 43 PID 3064 wrote to memory of 2708 3064 34c2d37434cb06c2874a49419d59ab45.exe 43 PID 3064 wrote to memory of 2708 3064 34c2d37434cb06c2874a49419d59ab45.exe 43 PID 3064 wrote to memory of 2708 3064 34c2d37434cb06c2874a49419d59ab45.exe 43 PID 3064 wrote to memory of 2708 3064 34c2d37434cb06c2874a49419d59ab45.exe 43 PID 3064 wrote to memory of 2708 3064 34c2d37434cb06c2874a49419d59ab45.exe 43 PID 3064 wrote to memory of 2556 3064 34c2d37434cb06c2874a49419d59ab45.exe 41 PID 3064 wrote to memory of 2556 3064 34c2d37434cb06c2874a49419d59ab45.exe 41 PID 3064 wrote to memory of 2556 3064 34c2d37434cb06c2874a49419d59ab45.exe 41 PID 3064 wrote to memory of 2556 3064 34c2d37434cb06c2874a49419d59ab45.exe 41 PID 3064 wrote to memory of 2556 3064 34c2d37434cb06c2874a49419d59ab45.exe 41 PID 3064 wrote to memory of 2556 3064 34c2d37434cb06c2874a49419d59ab45.exe 41 PID 3064 wrote to memory of 2556 3064 34c2d37434cb06c2874a49419d59ab45.exe 41 PID 3064 wrote to memory of 2564 3064 34c2d37434cb06c2874a49419d59ab45.exe 40 PID 3064 wrote to memory of 2564 3064 34c2d37434cb06c2874a49419d59ab45.exe 40 PID 3064 wrote to memory of 2564 3064 34c2d37434cb06c2874a49419d59ab45.exe 40 PID 3064 wrote to memory of 2564 3064 34c2d37434cb06c2874a49419d59ab45.exe 40 PID 3064 wrote to memory of 2564 3064 34c2d37434cb06c2874a49419d59ab45.exe 40 PID 3064 wrote to memory of 2564 3064 34c2d37434cb06c2874a49419d59ab45.exe 40 PID 3064 wrote to memory of 2564 3064 34c2d37434cb06c2874a49419d59ab45.exe 40 PID 3064 wrote to memory of 2592 3064 34c2d37434cb06c2874a49419d59ab45.exe 38 PID 3064 wrote to memory of 2592 3064 34c2d37434cb06c2874a49419d59ab45.exe 38 PID 3064 wrote to memory of 2592 3064 34c2d37434cb06c2874a49419d59ab45.exe 38 PID 3064 wrote to memory of 2592 3064 34c2d37434cb06c2874a49419d59ab45.exe 38 PID 3064 wrote to memory of 2592 3064 34c2d37434cb06c2874a49419d59ab45.exe 38 PID 3064 wrote to memory of 2592 3064 34c2d37434cb06c2874a49419d59ab45.exe 38 PID 3064 wrote to memory of 2592 3064 34c2d37434cb06c2874a49419d59ab45.exe 38 PID 2556 wrote to memory of 2780 2556 cmd.exe 36 PID 2556 wrote to memory of 2780 2556 cmd.exe 36 PID 2556 wrote to memory of 2780 2556 cmd.exe 36 PID 2556 wrote to memory of 2780 2556 cmd.exe 36 PID 2556 wrote to memory of 2780 2556 cmd.exe 36 PID 2556 wrote to memory of 2780 2556 cmd.exe 36 PID 2556 wrote to memory of 2780 2556 cmd.exe 36 PID 2556 wrote to memory of 2868 2556 cmd.exe 31 PID 2556 wrote to memory of 2868 2556 cmd.exe 31 PID 2556 wrote to memory of 2868 2556 cmd.exe 31 PID 2556 wrote to memory of 2868 2556 cmd.exe 31 PID 2556 wrote to memory of 2868 2556 cmd.exe 31 PID 2556 wrote to memory of 2868 2556 cmd.exe 31 PID 2556 wrote to memory of 2868 2556 cmd.exe 31 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2900 attrib.exe 2632 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34c2d37434cb06c2874a49419d59ab45.exe"C:\Users\Admin\AppData\Local\Temp\34c2d37434cb06c2874a49419d59ab45.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Sofe0\appapp.exeC:\Sofe0\appapp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Windows\SysWOW64\cmd.execmd /c afc9fe2f418b00a0.bat2⤵
- Deletes itself
PID:2592
-
-
C:\Windows\SysWOW64\sc.exesc config DcomLaunch start= auto2⤵
- Launches sc.exe
PID:2564
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Sofe0\common\lanmao.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2556
-
-
C:\Windows\SysWOW64\cscript.execscript.exe "C:\WINDOWS\system32\brilgrwjgksojrwmspk.vbs"2⤵PID:2708
-
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Temp" /T /P everyone:F1⤵PID:2868
-
C:\Windows\SysWOW64\attrib.exeattrib +H +R "C:\Sofe0"1⤵
- Views/modifies file attributes
PID:2900
-
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Temp\84018c44d2a03266a0e95d07765bde86.dat" /T /P everyone:N1⤵PID:1224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"1⤵PID:2436
-
C:\Windows\SysWOW64\attrib.exeattrib +H +R "C:\Users\Admin\AppData\Local\Temp\84018c44d2a03266a0e95d07765bde86.dat"1⤵
- Views/modifies file attributes
PID:2632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"1⤵PID:2780