Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16-01-2024 19:40
Behavioral task
behavioral1
Sample
0.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0.zip
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
0.exe
Resource
win7-20231129-en
General
-
Target
0.exe
-
Size
71KB
-
MD5
2a9d0d06d292a4cbbe4a95da4650ed54
-
SHA1
44c32dfae9ac971c3651adbd82c821971a5400dc
-
SHA256
09a1c17ac55cde962b4f3bcd61140d752d86362296ee74736000a6a647c73d8c
-
SHA512
ed15670a18bffa1c5c1d79f1a5a653d6b2bde649164c955473580321f4ab3d048124c26e1a92e9d8ba0edaf754617d2d2c13d8db92323e09957b6de225b5314d
-
SSDEEP
1536:jWZpTtLcWyeYd4//yEZc1GJf7/QP4uirySj5e:+pZTvnyEZiGJ7/QguiryS5e
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
Processes:
resource yara_rule behavioral3/memory/2356-1-0x0000000000400000-0x0000000000413000-memory.dmp family_gh0strat C:\Windows\FileName.jpg family_gh0strat C:\2806500.dll family_gh0strat \??\c:\windows\filename.jpg family_gh0strat -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2016 svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
0.exedescription ioc process File opened for modification C:\Windows\FileName.jpg 0.exe File created C:\Windows\FileName.jpg 0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe 2016 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
0.exedescription pid process Token: SeBackupPrivilege 2356 0.exe Token: SeRestorePrivilege 2356 0.exe Token: SeBackupPrivilege 2356 0.exe Token: SeRestorePrivilege 2356 0.exe Token: SeBackupPrivilege 2356 0.exe Token: SeRestorePrivilege 2356 0.exe Token: SeBackupPrivilege 2356 0.exe Token: SeRestorePrivilege 2356 0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0.exe"C:\Users\Admin\AppData\Local\Temp\0.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\2806500.dllFilesize
64KB
MD545dc749351fd65d71da89ca2ed2766cb
SHA1e080faf81157b7f867cb56938c5e579c206af9b9
SHA256391109432ba2df9f3ebc74e0144f42a490405f7c8ecb51da01b4ce793be72f25
SHA5127e63d8778a4656a19397849a6edb483993f1183257fb8c0793ad4b5c625ed69d1b9472969bac6dfc98938e19baed7e3e61ab80085a1a6edd8a50ca660ce3bf74
-
C:\Windows\FileName.jpgFilesize
775KB
MD59069fb7a4b151f2c3551b272f98e31b8
SHA1ab9f50640162aee61d1196358a38d34c8cd0ebee
SHA2563b1c885910a92ab47f8f0f872c303c367ba350b6509c695a78fefb866741af76
SHA512e0a2f6ae2f93e08b0cc95e54bc492569d2340d909a70f76e914fd0b0493b06c10a1dffec8e21ccc67d1da62a324b4d605f49ee74831169fe19d98208de7d0eff
-
\??\c:\NT_Path.jpgFilesize
54B
MD5e64dac793cc7ee4aa530273d4c61ba02
SHA1cea52ee017eda0ecf6fdeb18a03ae98fe0e83b27
SHA2569a311ca461ada2ff181aa8f5558d7a5787da197e3256612ab634c2289590106a
SHA512336fa0e7bd8360f47cf2381a16987b5d340b8ef8b60044dba16ff18b524346e788a3aed144122a55a5d760e86b281bec91f4a5e25671e722b595bfbe5b6b5963
-
\??\c:\windows\filename.jpgFilesize
727KB
MD545efc9f4c1c67fed229a6359facd8cd6
SHA182dc6ebedc29d8b8e64c10cdf75b0f10b562639a
SHA2566046535516a3cdf6ef8812ddc552385150b49444a1d22edad53a4da8ab7db9c0
SHA5121dfaf4662940db338f362752f9c51517295b5240a0109d2d1bda34503bacec891f5591ff1dd409c81918b1da84885cd67875cb02f6646821814b3ec0773efd0e
-
memory/2356-1-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB