Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
eb867fa5310709ec60c8b51f768dcf5d.exe
Resource
win7-20231215-en
General
-
Target
eb867fa5310709ec60c8b51f768dcf5d.exe
-
Size
96KB
-
MD5
eb867fa5310709ec60c8b51f768dcf5d
-
SHA1
2d61c3813518c310972a8578b90a51d2161058e5
-
SHA256
27f59251422932e92eda4b1ea0064c2dd86d005830646da316e9e6511f1c8bdc
-
SHA512
f76b246351b212ab5ab8e12abda8522f98338030e6e976cc8526b84c0c817db871bb2ba5e617e1c956fb15bbea037cc08103c9826bb5e0df3ff2e71ffc724788
-
SSDEEP
1536:6uFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prI7HlnxyHTH:6US4jHS8q/3nTzePCwNUh4E9I7H98HD
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x0008000000023227-14.dat family_gh0strat behavioral2/files/0x0008000000023227-15.dat family_gh0strat behavioral2/memory/1204-16-0x0000000000400000-0x000000000044E318-memory.dmp family_gh0strat behavioral2/files/0x0008000000023227-19.dat family_gh0strat behavioral2/files/0x0008000000023227-23.dat family_gh0strat -
Deletes itself 1 IoCs
pid Process 1204 chjlivvgyj -
Executes dropped EXE 1 IoCs
pid Process 1204 chjlivvgyj -
Loads dropped DLL 3 IoCs
pid Process 1112 svchost.exe 3128 svchost.exe 3328 svchost.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\qrhywkrgnm svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\qavsenteah svchost.exe File created C:\Windows\SysWOW64\qamxdwcwns svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\qqojtdgsnj svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 2904 1112 WerFault.exe 93 3400 3128 WerFault.exe 97 3440 3328 WerFault.exe 100 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1204 chjlivvgyj 1204 chjlivvgyj -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeRestorePrivilege 1204 chjlivvgyj Token: SeBackupPrivilege 1204 chjlivvgyj Token: SeBackupPrivilege 1204 chjlivvgyj Token: SeRestorePrivilege 1204 chjlivvgyj Token: SeBackupPrivilege 1112 svchost.exe Token: SeRestorePrivilege 1112 svchost.exe Token: SeBackupPrivilege 1112 svchost.exe Token: SeBackupPrivilege 1112 svchost.exe Token: SeSecurityPrivilege 1112 svchost.exe Token: SeSecurityPrivilege 1112 svchost.exe Token: SeBackupPrivilege 1112 svchost.exe Token: SeBackupPrivilege 1112 svchost.exe Token: SeSecurityPrivilege 1112 svchost.exe Token: SeBackupPrivilege 1112 svchost.exe Token: SeBackupPrivilege 1112 svchost.exe Token: SeSecurityPrivilege 1112 svchost.exe Token: SeBackupPrivilege 1112 svchost.exe Token: SeRestorePrivilege 1112 svchost.exe Token: SeBackupPrivilege 3128 svchost.exe Token: SeRestorePrivilege 3128 svchost.exe Token: SeBackupPrivilege 3128 svchost.exe Token: SeBackupPrivilege 3128 svchost.exe Token: SeSecurityPrivilege 3128 svchost.exe Token: SeSecurityPrivilege 3128 svchost.exe Token: SeBackupPrivilege 3128 svchost.exe Token: SeBackupPrivilege 3128 svchost.exe Token: SeSecurityPrivilege 3128 svchost.exe Token: SeBackupPrivilege 3128 svchost.exe Token: SeBackupPrivilege 3128 svchost.exe Token: SeSecurityPrivilege 3128 svchost.exe Token: SeBackupPrivilege 3128 svchost.exe Token: SeRestorePrivilege 3128 svchost.exe Token: SeBackupPrivilege 3328 svchost.exe Token: SeRestorePrivilege 3328 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4308 wrote to memory of 1204 4308 eb867fa5310709ec60c8b51f768dcf5d.exe 91 PID 4308 wrote to memory of 1204 4308 eb867fa5310709ec60c8b51f768dcf5d.exe 91 PID 4308 wrote to memory of 1204 4308 eb867fa5310709ec60c8b51f768dcf5d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb867fa5310709ec60c8b51f768dcf5d.exe"C:\Users\Admin\AppData\Local\Temp\eb867fa5310709ec60c8b51f768dcf5d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
\??\c:\users\admin\appdata\local\chjlivvgyj"C:\Users\Admin\AppData\Local\Temp\eb867fa5310709ec60c8b51f768dcf5d.exe" a -sc:\users\admin\appdata\local\temp\eb867fa5310709ec60c8b51f768dcf5d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 7922⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1112 -ip 11121⤵PID:3848
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 8522⤵
- Program crash
PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3128 -ip 31281⤵PID:3656
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 10602⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3328 -ip 33281⤵PID:1772
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD530203266dd69f9e7dc0402d209471e1f
SHA1ba83c3476e0568207852b2718d99b792b4e881a6
SHA2567f5242aca79301b6f583869db33c763937293b4240c9fc8521b586634c3fdf31
SHA512000ef14397bf782015b470e2ad7b3ad16868cd207fa838734ac904ccb41ef7e694469772b913907ba78b3b5d184ff36258987b8ee13744cecdb331148eede86f
-
Filesize
36KB
MD5cd17d30b17be9d03ffdcb32d1f358c13
SHA170fac90037300b95095f670b3067e72cf30665d4
SHA256959fb8dd330a4afa724d776ff6c660b42c5fc72be4485b0c77654d7c6e305e37
SHA512a72a484bea344d8787536b5b16bfd66fb427ed776317991562aca7f563905575aa1c0952b308e6d4b90fd5e3568073a65729abe9bfce9d5c378fd4eab1e73a60
-
Filesize
945KB
MD50b10961bd7726b55211e440da3bcfffc
SHA189e88451d5f6834128d4784b3620eecdc12f7908
SHA25667ff4caab416c8a4175930d5a5a26ef54fede88a91e8a599eeb4d1716c860816
SHA512629db73578d401602a2219528435c5feee51ec6a7591ba1f6fb6e68fbb841a0ffcf5796c80008fcc5ba5a68f6271f33d6f608449198ca86065991a0c7a9114f5
-
Filesize
202B
MD56ff48b0f4575716912f79579689c3178
SHA11bec9a060e090f18e5ff686b05b18d44dd637fd0
SHA256e4215469e5c4f776932717c38c85138cb70ae868b4d0e15dbfa5d900ddb07739
SHA512bf9a9a43e050dff1004e0ed147b598b0d5ce49107a4c8d5f0dd8bb055b66dcb5ae079da3587d2d5b88342c8720ffafbfedfe47d26dde98b65a4861c5e7be2d2f
-
Filesize
303B
MD5aa4845800145b95b3693beb805574c69
SHA1ed504a198734dbe597f74b2d6a9dfe06125bee91
SHA256b849b434e4745e554c67c24e7746b7ba1512ae6498fe010e4c936a14b191a90e
SHA5122ce97e4a1558f21e867325a46f97edd4fb2e8dd5d4e4c0d3068745a123f32236f145b6317c2c62d94f54c0424ac0461e26e35c027ba7831c14bf5d6f8693c9fb
-
Filesize
99KB
MD5676b15b6be0e6214b35959b5bf103d2d
SHA1f83dc9608f208f92f2cc45ea0cb7033cb8009d8c
SHA2566318e8c46b3a17339097ad7db3a09aeed7848bb9d87f75315ed1be6938899651
SHA5122d7a8c0d4f544a292b0a6694cbc7da84134cecf6be4e4792905e4d15683b29780ca509be9f6cf22b1e0ebf12e54448373020de6f69fa43eb7113f75367877932
-
Filesize
320KB
MD59f58b39ebc1e75d4db2bc6a09014a5ed
SHA1c4a6a88fdb91a5e404fb708ce34c3e5ce013ab6c
SHA256aeb871c23ffc01047c30d19adb810263058b06d6d415f5ae83a43deb82c6c9b9
SHA5120891d428345a646fe21dfbd2ba935362a88cd30da804d7bd211f42bb0f7a7f1570f5a6c1fa135ffcf17b7a365e57ff760895588c3ac4a36fb7a8ff00533c72f5