Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
72f39156f139ac6c0e33c20d94796aa4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
72f39156f139ac6c0e33c20d94796aa4.exe
Resource
win10v2004-20231215-en
General
-
Target
72f39156f139ac6c0e33c20d94796aa4.exe
-
Size
183KB
-
MD5
72f39156f139ac6c0e33c20d94796aa4
-
SHA1
ff4c4dc3dbdb4707633b23ee4d43612a46565eac
-
SHA256
0d76d8d65d7ec90e2a0356d3415521c6af2d7bc15461b655b620409fe7fe44dc
-
SHA512
9b91585e39870c9f5b18db1f0693dbe8c339444e5598c2358db5c5d4830b94d4a663ebd22b7ca2b5aa27ffe5a1642b1ee9aaedbc091c3d2215b305327cd54249
-
SSDEEP
3072:w85KYTt2SIT0chwzzcdZKF8UvvoeWofjjpAVioRF8s//NLj6h+EvtRy:VHcMmwzlqUHoeWofjjpAViY/lH6h+Evy
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/4420-4-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/4420-5-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/4420-7-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX06B699C4 = "C:\\Windows\\XXXXXX06B699C4\\svchsot.exe" 72f39156f139ac6c0e33c20d94796aa4.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default 72f39156f139ac6c0e33c20d94796aa4.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\XXXXXX06B699C4\JH.BAT 72f39156f139ac6c0e33c20d94796aa4.exe File created C:\Windows\XXXXXX06B699C4\svchsot.exe 72f39156f139ac6c0e33c20d94796aa4.exe File opened for modification C:\Windows\XXXXXX06B699C4\svchsot.exe 72f39156f139ac6c0e33c20d94796aa4.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2540 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4420 72f39156f139ac6c0e33c20d94796aa4.exe 4420 72f39156f139ac6c0e33c20d94796aa4.exe 4420 72f39156f139ac6c0e33c20d94796aa4.exe 4420 72f39156f139ac6c0e33c20d94796aa4.exe 4420 72f39156f139ac6c0e33c20d94796aa4.exe 4420 72f39156f139ac6c0e33c20d94796aa4.exe 4420 72f39156f139ac6c0e33c20d94796aa4.exe 4420 72f39156f139ac6c0e33c20d94796aa4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 2084 4420 72f39156f139ac6c0e33c20d94796aa4.exe 86 PID 4420 wrote to memory of 2084 4420 72f39156f139ac6c0e33c20d94796aa4.exe 86 PID 4420 wrote to memory of 2084 4420 72f39156f139ac6c0e33c20d94796aa4.exe 86 PID 2084 wrote to memory of 1576 2084 cmd.exe 88 PID 2084 wrote to memory of 1576 2084 cmd.exe 88 PID 2084 wrote to memory of 1576 2084 cmd.exe 88 PID 2084 wrote to memory of 2540 2084 cmd.exe 92 PID 2084 wrote to memory of 2540 2084 cmd.exe 92 PID 2084 wrote to memory of 2540 2084 cmd.exe 92 PID 2084 wrote to memory of 1776 2084 cmd.exe 89 PID 2084 wrote to memory of 1776 2084 cmd.exe 89 PID 2084 wrote to memory of 1776 2084 cmd.exe 89 PID 1776 wrote to memory of 1708 1776 net.exe 90 PID 1776 wrote to memory of 1708 1776 net.exe 90 PID 1776 wrote to memory of 1708 1776 net.exe 90 PID 2084 wrote to memory of 4628 2084 cmd.exe 91 PID 2084 wrote to memory of 4628 2084 cmd.exe 91 PID 2084 wrote to memory of 4628 2084 cmd.exe 91 PID 2084 wrote to memory of 4268 2084 cmd.exe 93 PID 2084 wrote to memory of 4268 2084 cmd.exe 93 PID 2084 wrote to memory of 4268 2084 cmd.exe 93 PID 2084 wrote to memory of 1984 2084 cmd.exe 94 PID 2084 wrote to memory of 1984 2084 cmd.exe 94 PID 2084 wrote to memory of 1984 2084 cmd.exe 94 PID 2084 wrote to memory of 3948 2084 cmd.exe 95 PID 2084 wrote to memory of 3948 2084 cmd.exe 95 PID 2084 wrote to memory of 3948 2084 cmd.exe 95 PID 2084 wrote to memory of 2688 2084 cmd.exe 110 PID 2084 wrote to memory of 2688 2084 cmd.exe 110 PID 2084 wrote to memory of 2688 2084 cmd.exe 110 PID 2084 wrote to memory of 1632 2084 cmd.exe 108 PID 2084 wrote to memory of 1632 2084 cmd.exe 108 PID 2084 wrote to memory of 1632 2084 cmd.exe 108 PID 2084 wrote to memory of 4220 2084 cmd.exe 96 PID 2084 wrote to memory of 4220 2084 cmd.exe 96 PID 2084 wrote to memory of 4220 2084 cmd.exe 96 PID 2084 wrote to memory of 4964 2084 cmd.exe 97 PID 2084 wrote to memory of 4964 2084 cmd.exe 97 PID 2084 wrote to memory of 4964 2084 cmd.exe 97 PID 2084 wrote to memory of 4032 2084 cmd.exe 107 PID 2084 wrote to memory of 4032 2084 cmd.exe 107 PID 2084 wrote to memory of 4032 2084 cmd.exe 107 PID 2084 wrote to memory of 3720 2084 cmd.exe 98 PID 2084 wrote to memory of 3720 2084 cmd.exe 98 PID 2084 wrote to memory of 3720 2084 cmd.exe 98 PID 2084 wrote to memory of 4036 2084 cmd.exe 99 PID 2084 wrote to memory of 4036 2084 cmd.exe 99 PID 2084 wrote to memory of 4036 2084 cmd.exe 99 PID 2084 wrote to memory of 1528 2084 cmd.exe 100 PID 2084 wrote to memory of 1528 2084 cmd.exe 100 PID 2084 wrote to memory of 1528 2084 cmd.exe 100 PID 2084 wrote to memory of 2548 2084 cmd.exe 101 PID 2084 wrote to memory of 2548 2084 cmd.exe 101 PID 2084 wrote to memory of 2548 2084 cmd.exe 101 PID 2084 wrote to memory of 2608 2084 cmd.exe 103 PID 2084 wrote to memory of 2608 2084 cmd.exe 103 PID 2084 wrote to memory of 2608 2084 cmd.exe 103 PID 2084 wrote to memory of 2632 2084 cmd.exe 102 PID 2084 wrote to memory of 2632 2084 cmd.exe 102 PID 2084 wrote to memory of 2632 2084 cmd.exe 102 PID 2084 wrote to memory of 404 2084 cmd.exe 104 PID 2084 wrote to memory of 404 2084 cmd.exe 104 PID 2084 wrote to memory of 404 2084 cmd.exe 104 PID 2084 wrote to memory of 676 2084 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\72f39156f139ac6c0e33c20d94796aa4.exe"C:\Users\Admin\AppData\Local\Temp\72f39156f139ac6c0e33c20d94796aa4.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\XXXXXX06B699C4\JH.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵PID:1576
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵PID:1708
-
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:4628
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
PID:2540
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:4268
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:1984
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:3948
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:4220
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:4964
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:3720
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:4036
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:1528
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:2548
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:2632
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:2608
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:404
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:676
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:3860
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:4032
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:1632
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:1480
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:2688
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:3540
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:2040
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:2012
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:5052
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:628
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXX06B699C4\svchsot.exe3⤵PID:1608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5de8cefc4177ba7bdddbfb9c6fb822b47
SHA16fb5cc6188289223a4a95d2955564bbb83f26577
SHA256216efa61a93440e730f6d90b30a1f22b0e827c7bce8a6fb8b2dc8cfcc5a9829d
SHA5120ec7fc897e9935e8187d20a76453e9adbacb74e04ddf2f9202b945b5f4a3b68f745e50b37f5dd04a68ab635cd12058b45b3fec32b15f26b08d91bc1ef1cecf74