Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 22:57
Behavioral task
behavioral1
Sample
c9d7315180eddce5f8766931d3d253d9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9d7315180eddce5f8766931d3d253d9.exe
Resource
win10v2004-20240226-en
General
-
Target
c9d7315180eddce5f8766931d3d253d9.exe
-
Size
260KB
-
MD5
c9d7315180eddce5f8766931d3d253d9
-
SHA1
2882ac46abacea7a10f25155d20eb2a5c75aeb17
-
SHA256
d170cc1da0025093edda8273ad24ab525fd5e8a050327e42e438c0c6337e47f8
-
SHA512
58cbd84f3ad71db150f5f0f78651a233e4f38b365baafc7b7ad0f4856846688ea9a83ae553693dde2639216cc73c48711399dd9d93a4a5d8080f83a48248eb80
-
SSDEEP
6144:n2Rnh5EsIm2E47RNYQRsyXStY09inGogj1Y6:neh5EsIY4dNPtiy090Ni26
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x002d0000000140f7-6.dat family_gh0strat -
Deletes itself 1 IoCs
pid Process 3020 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2324 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2728 c9d7315180eddce5f8766931d3d253d9.exe 2728 c9d7315180eddce5f8766931d3d253d9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\V2011 = "C:\\WINDOWS\\V2011.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\V2011.exe svchost.exe File opened for modification C:\WINDOWS\V2011.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2728 c9d7315180eddce5f8766931d3d253d9.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2324 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2324 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2324 2728 c9d7315180eddce5f8766931d3d253d9.exe 27 PID 2728 wrote to memory of 2324 2728 c9d7315180eddce5f8766931d3d253d9.exe 27 PID 2728 wrote to memory of 2324 2728 c9d7315180eddce5f8766931d3d253d9.exe 27 PID 2728 wrote to memory of 2324 2728 c9d7315180eddce5f8766931d3d253d9.exe 27 PID 2728 wrote to memory of 3020 2728 c9d7315180eddce5f8766931d3d253d9.exe 30 PID 2728 wrote to memory of 3020 2728 c9d7315180eddce5f8766931d3d253d9.exe 30 PID 2728 wrote to memory of 3020 2728 c9d7315180eddce5f8766931d3d253d9.exe 30 PID 2728 wrote to memory of 3020 2728 c9d7315180eddce5f8766931d3d253d9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9d7315180eddce5f8766931d3d253d9.exe"C:\Users\Admin\AppData\Local\Temp\c9d7315180eddce5f8766931d3d253d9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\V2011\svchost.exeC:\Users\Admin\AppData\Local\Temp\V2011\svchost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\SysWOW64\cmd.execmd /c afc9fe2f418b00a0.bat2⤵
- Deletes itself
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5c9d7315180eddce5f8766931d3d253d9
SHA12882ac46abacea7a10f25155d20eb2a5c75aeb17
SHA256d170cc1da0025093edda8273ad24ab525fd5e8a050327e42e438c0c6337e47f8
SHA51258cbd84f3ad71db150f5f0f78651a233e4f38b365baafc7b7ad0f4856846688ea9a83ae553693dde2639216cc73c48711399dd9d93a4a5d8080f83a48248eb80
-
Filesize
2KB
MD59f2850140264669fb987d32a3cfa5b4e
SHA133f846898f4600204a083dc4eaba633dcab35f90
SHA2569cd24e1b16651ca8a1ee6db8695c57033b98b9da3cb59b1d86591804436f5ccb
SHA5125c825dabc2061c6376cf17c4a6c712735a182022bc6cf45aa49e2a098202af5bb4545ea8ae6b87078548ee61791648ec3ac47e1ec62e4709efe776121ca20070