Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 10:55
Behavioral task
behavioral1
Sample
be6d693b1e5b88308f100bb4ae6f9585.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
be6d693b1e5b88308f100bb4ae6f9585.exe
Resource
win10v2004-20231215-en
General
-
Target
be6d693b1e5b88308f100bb4ae6f9585.exe
-
Size
64KB
-
MD5
be6d693b1e5b88308f100bb4ae6f9585
-
SHA1
2efba56549969c6afdfab18375162a212db7bb51
-
SHA256
87947c8440b2942c1f17dabd18546dc633d10194e7e1c79aee22577b34edaa30
-
SHA512
d9043a1b3df216ad8a94970439b0ec5fb1e5d5db995be77deca2f2ea16f2d3697bc01139ce54e1d1d1ebc762caa0a67fe0727043d1ecfa216ce2bf349bf91e9a
-
SSDEEP
1536:Sb27b2sOlHkfBKHVkzsc4jwWPgiqxiMnYiqYqqn+jviG4M1:F7yjHQMAs/jwRiyil
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000a0000000231e9-4.dat family_gh0strat behavioral2/memory/1536-14-0x0000000000400000-0x000000000042F400-memory.dmp family_gh0strat -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys be6d693b1e5b88308f100bb4ae6f9585.exe File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys svchost.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibilityex.dll" be6d693b1e5b88308f100bb4ae6f9585.exe -
Deletes itself 1 IoCs
pid Process 744 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1536 be6d693b1e5b88308f100bb4ae6f9585.exe 744 svchost.exe -
resource yara_rule behavioral2/memory/1536-0-0x0000000000400000-0x000000000042F400-memory.dmp upx behavioral2/memory/1536-14-0x0000000000400000-0x000000000042F400-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibilityex.dll be6d693b1e5b88308f100bb4ae6f9585.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\be6d693b1e5b88308f100bb4ae6f9585.exe"C:\Users\Admin\AppData\Local\Temp\be6d693b1e5b88308f100bb4ae6f9585.exe"1⤵
- Drops file in Drivers directory
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
PID:1536
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Drops file in Drivers directory
- Deletes itself
- Loads dropped DLL
PID:744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD52e0eb88e8c013e20a1186f3842f191cd
SHA1e29409127160aaf63040873cce08fb4212f6ab7e
SHA256e52798a232c3147ae66b30e6444e653c249d7eaaee09dae6af3df95e2de21541
SHA5127abeae95b2391c173c2b7b167a23d0d33806e921a9696535a6e8fda555d7cb3bfc2b8f6f3ed374fa7eb7a0880b009cd4971cadef2f273a985a3f68fd4c5b7ad9
-
Filesize
70B
MD5741627da6c0fd22dfa7573ada2308a1d
SHA1133d0095547e52e590543497c90f3a1b5d90cf99
SHA256e9378eedae07f816f50f70300f09359b67f32ba4ab71d93735eb60a2337ac238
SHA5126437d130bfc96cef41e8e0b9416c97fb7e4e04b3c211754dd6c5157ab568392cdde82ecb1b4bce255241869e1713ea10a96c971042358819ff90e21a4776b292