Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 06:44
Static task
static1
Behavioral task
behavioral1
Sample
11582d5b304618a72758a284988f5bcd.exe
Resource
win7-20231215-en
General
-
Target
11582d5b304618a72758a284988f5bcd.exe
-
Size
252KB
-
MD5
11582d5b304618a72758a284988f5bcd
-
SHA1
629ec287cfaaf107e83a35ce7ebba8534049ec16
-
SHA256
dab7dec1dc8dc829d8d76ccc061f3789ef22195dd008d89755b2a4e02b6ce028
-
SHA512
37679646039a5e09192b83ddb31325fbef69c31b1e768fde0a0dba221badea4aff5e3cae60eafc18ccd27e673f80cd553154d4626401a532698c4f4a067b0538
-
SSDEEP
6144:SxprF/c5ANnj62gRFXV44colzQ9c6p2ItBDj+ZOYF:qp5/cq9QhIoS9VfDjEOa
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3368-10-0x0000000010000000-0x0000000010031000-memory.dmp family_gh0strat behavioral2/memory/796-27-0x0000000010000000-0x0000000010031000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 796 gyggue.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\vir9.exe gyggue.exe File created C:\Windows\SysWOW64\vir4.exe gyggue.exe File created C:\Windows\SysWOW64\vir7.exe gyggue.exe File created C:\Windows\SysWOW64\vir8.exe gyggue.exe File created C:\Windows\SysWOW64\vir3.exe gyggue.exe File created C:\Windows\SysWOW64\vir5.exe gyggue.exe File created C:\Windows\SysWOW64\vir6.exe gyggue.exe File created C:\Windows\SysWOW64\vir0.exe gyggue.exe File created C:\Windows\SysWOW64\vir1.exe gyggue.exe File created C:\Windows\SysWOW64\vir2.exe gyggue.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\gyggue.exe 11582d5b304618a72758a284988f5bcd.exe File opened for modification C:\Windows\gyggue.exe 11582d5b304618a72758a284988f5bcd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3368 11582d5b304618a72758a284988f5bcd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11582d5b304618a72758a284988f5bcd.exe"C:\Users\Admin\AppData\Local\Temp\11582d5b304618a72758a284988f5bcd.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
C:\Windows\gyggue.exeC:\Windows\gyggue.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:796
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD523b2cf72529947ce85d63b4c4ebbe9e6
SHA113f88098374bc09a20e4bd467634770fcf1823aa
SHA256bec247dbd58c324045f04268af47edd80cfe6ae5b4076fa2fe00f6e4bf783545
SHA51238eca9e139290108f582529361effd79e65649d5705bd50d858d9d1ce36dc35918adeed97b5f160fd626161f8a6e6a002567d92156dc7fe2a93901afae0140e0
-
Filesize
252KB
MD511582d5b304618a72758a284988f5bcd
SHA1629ec287cfaaf107e83a35ce7ebba8534049ec16
SHA256dab7dec1dc8dc829d8d76ccc061f3789ef22195dd008d89755b2a4e02b6ce028
SHA51237679646039a5e09192b83ddb31325fbef69c31b1e768fde0a0dba221badea4aff5e3cae60eafc18ccd27e673f80cd553154d4626401a532698c4f4a067b0538