Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
fe463a49a4446fcaf52ba769c917b203.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fe463a49a4446fcaf52ba769c917b203.exe
Resource
win10v2004-20231215-en
General
-
Target
fe463a49a4446fcaf52ba769c917b203.exe
-
Size
192KB
-
MD5
fe463a49a4446fcaf52ba769c917b203
-
SHA1
21120db5c551cf1f95d544a2c09d56d61c0758b4
-
SHA256
79ffd7653880068fb44a441fbbab8e727b7ae7bd06304dfbc4d7816ebd6dd7ab
-
SHA512
aa21a12a2a6f9cc0b4e38271d49710d266f11b5fd54f4cade7aff953cd02003d09fc78bc66d5dd36bede042725828a9d4bdd95844c0c5d93b4a197dc30c81ef3
-
SSDEEP
3072:r2y1AnWLgCRlBsEcumxPiS6MRBAKAVRDDZOHv27KVfgjJUexltjkwbwHMim3D:ynWLgCRAEcu+fGK4XOHv2RxlNk4ws
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3060-5-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat behavioral2/memory/5008-6-0x0000000000400000-0x0000000000431000-memory.dmp family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fastuserswitchingcompatibility\parameters\servicedll = "C:\\PROGRA~2\\NETMEE~1\\vyfvd.dll" svchost.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fastuserswitchingcompatibility\ImagePath = "%SystemRoot%\\System32\\svchost.exe -k netsvcs" svchost.exe -
Deletes itself 1 IoCs
pid Process 3060 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 3060 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\d2f5ca0e.del fe463a49a4446fcaf52ba769c917b203.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRA~2\NETMEE~1\vyfvd.dll fe463a49a4446fcaf52ba769c917b203.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 5008 fe463a49a4446fcaf52ba769c917b203.exe 5008 fe463a49a4446fcaf52ba769c917b203.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe 3060 svchost.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeBackupPrivilege 5008 fe463a49a4446fcaf52ba769c917b203.exe Token: SeRestorePrivilege 5008 fe463a49a4446fcaf52ba769c917b203.exe Token: SeBackupPrivilege 3060 svchost.exe Token: SeSecurityPrivilege 3060 svchost.exe Token: SeSecurityPrivilege 3060 svchost.exe Token: SeBackupPrivilege 3060 svchost.exe Token: SeSecurityPrivilege 3060 svchost.exe Token: SeBackupPrivilege 3060 svchost.exe Token: SeSecurityPrivilege 3060 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe463a49a4446fcaf52ba769c917b203.exe"C:\Users\Admin\AppData\Local\Temp\fe463a49a4446fcaf52ba769c917b203.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Sets DLL path for service in the registry
- Sets service image path in registry
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060