Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 01:11
Behavioral task
behavioral1
Sample
c4961e0e81369e85526268d1ffdd202d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4961e0e81369e85526268d1ffdd202d.exe
Resource
win10v2004-20240226-en
General
-
Target
c4961e0e81369e85526268d1ffdd202d.exe
-
Size
116KB
-
MD5
c4961e0e81369e85526268d1ffdd202d
-
SHA1
9531ca028f4a4bf9aeeea9068d89c51cacb4077d
-
SHA256
dd5db6e6a467ced0c7c951388d500cb3f95875d3ec3c1b5f450fd26395e165fa
-
SHA512
aba32138d5c770767aa33783322f81cb3ad88bf46830f707e9c844db6d3b34c5c0c0effa4122a5c233f011beea6a03f4e14e925dd896858ce85f79d1c186c21f
-
SSDEEP
3072:sNWHXwh1VZS85sdnGJ4PwNOCc3NASUDASttaB+VEFL2:s8HXwh1XSqmnGeP8XdSCtttNV62
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/2800-0-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat behavioral2/memory/2800-1-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\360svc\Parameters\ServiceDll = "C:\\ProgramData\\DRM\\user32.dll" c4961e0e81369e85526268d1ffdd202d.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation c4961e0e81369e85526268d1ffdd202d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2800 c4961e0e81369e85526268d1ffdd202d.exe 2800 c4961e0e81369e85526268d1ffdd202d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4961e0e81369e85526268d1ffdd202d.exe"C:\Users\Admin\AppData\Local\Temp\c4961e0e81369e85526268d1ffdd202d.exe"1⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵PID:5084