Analysis
-
max time kernel
151s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4.exe
Resource
win7-20231215-en
General
-
Target
ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4.exe
-
Size
600KB
-
MD5
5139ade75af37250e97b19f76a532621
-
SHA1
94e76438bca9b7786e917b344f7cce319eb53f34
-
SHA256
ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4
-
SHA512
1ef0e4c8f4ec46146c2de88b40d25ba43ac76437de81458cffae87fa5a8030b4176a3d4e59470066318d8fcf9cb0aeeebda6c4c9d51b721af5dbeca22c6e8c7a
-
SSDEEP
6144:8PIP+niD5Gcc8419jmjA3c8lDPj2DLxrj61wW1wNE1wUzA:8P3iw8yaA3c8VGxvmH44n
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/4860-3-0x0000000010000000-0x000000001000F000-memory.dmp family_gh0strat behavioral2/memory/2452-13-0x0000000010000000-0x000000001000F000-memory.dmp family_gh0strat behavioral2/memory/1972-20-0x0000000010000000-0x000000001000F000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Gwcggu.com -
Executes dropped EXE 2 IoCs
pid Process 2452 Gwcggu.com 1972 Gwcggu.com -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\Gwcggu.com ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4.exe File opened for modification C:\windows\Gwcggu.com ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4860 ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4.exe Token: 33 1972 Gwcggu.com Token: SeIncBasePriorityPrivilege 1972 Gwcggu.com Token: 33 1972 Gwcggu.com Token: SeIncBasePriorityPrivilege 1972 Gwcggu.com -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4860 wrote to memory of 2588 4860 ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4.exe 91 PID 4860 wrote to memory of 2588 4860 ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4.exe 91 PID 4860 wrote to memory of 2588 4860 ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4.exe 91 PID 2452 wrote to memory of 1972 2452 Gwcggu.com 92 PID 2452 wrote to memory of 1972 2452 Gwcggu.com 92 PID 2452 wrote to memory of 1972 2452 Gwcggu.com 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4.exe"C:\Users\Admin\AppData\Local\Temp\ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\AE0E44~1.EXE > nul2⤵PID:2588
-
-
C:\windows\Gwcggu.comC:\windows\Gwcggu.com -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\windows\Gwcggu.comC:\windows\Gwcggu.com -acsi2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600KB
MD55139ade75af37250e97b19f76a532621
SHA194e76438bca9b7786e917b344f7cce319eb53f34
SHA256ae0e44afbfd5f450f7a5f0dae68869163d469cf56c836b7c4f2f7866ccb1b5a4
SHA5121ef0e4c8f4ec46146c2de88b40d25ba43ac76437de81458cffae87fa5a8030b4176a3d4e59470066318d8fcf9cb0aeeebda6c4c9d51b721af5dbeca22c6e8c7a
-
Filesize
4B
MD5250413d2982f1f83aa62a3a323cd2a87
SHA13c24f257fbe14b58141a0ab7dbd5484c1d561f2c
SHA25654a462dce3c1abb2b43ba63a42bc391fa5561bfeafe737bd1f4845b902ffbfe3
SHA512e62538b99ca820e4ef2c24da6dc2afbe963c6793f0f7a93dbc231bdf44b77baa288d4ed18e8b05a3e5446454029d127fa54ead1c5fd9d7ff91fa21006e12f699