Analysis
-
max time kernel
160s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 22:57
Behavioral task
behavioral1
Sample
c9d7315180eddce5f8766931d3d253d9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9d7315180eddce5f8766931d3d253d9.exe
Resource
win10v2004-20240226-en
General
-
Target
c9d7315180eddce5f8766931d3d253d9.exe
-
Size
260KB
-
MD5
c9d7315180eddce5f8766931d3d253d9
-
SHA1
2882ac46abacea7a10f25155d20eb2a5c75aeb17
-
SHA256
d170cc1da0025093edda8273ad24ab525fd5e8a050327e42e438c0c6337e47f8
-
SHA512
58cbd84f3ad71db150f5f0f78651a233e4f38b365baafc7b7ad0f4856846688ea9a83ae553693dde2639216cc73c48711399dd9d93a4a5d8080f83a48248eb80
-
SSDEEP
6144:n2Rnh5EsIm2E47RNYQRsyXStY09inGogj1Y6:neh5EsIY4dNPtiy090Ni26
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0002000000022ea1-3.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 4184 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\V2011 = "C:\\WINDOWS\\V2011.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\V2011.exe svchost.exe File opened for modification C:\WINDOWS\V2011.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2284 c9d7315180eddce5f8766931d3d253d9.exe 2284 c9d7315180eddce5f8766931d3d253d9.exe 4184 svchost.exe 4184 svchost.exe 4184 svchost.exe 4184 svchost.exe 4184 svchost.exe 4184 svchost.exe 4184 svchost.exe 4184 svchost.exe 4184 svchost.exe 4184 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4184 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4184 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2284 wrote to memory of 4184 2284 c9d7315180eddce5f8766931d3d253d9.exe 98 PID 2284 wrote to memory of 4184 2284 c9d7315180eddce5f8766931d3d253d9.exe 98 PID 2284 wrote to memory of 4184 2284 c9d7315180eddce5f8766931d3d253d9.exe 98 PID 2284 wrote to memory of 1288 2284 c9d7315180eddce5f8766931d3d253d9.exe 109 PID 2284 wrote to memory of 1288 2284 c9d7315180eddce5f8766931d3d253d9.exe 109 PID 2284 wrote to memory of 1288 2284 c9d7315180eddce5f8766931d3d253d9.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9d7315180eddce5f8766931d3d253d9.exe"C:\Users\Admin\AppData\Local\Temp\c9d7315180eddce5f8766931d3d253d9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\V2011\svchost.exeC:\Users\Admin\AppData\Local\Temp\V2011\svchost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat2⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1328 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5f8b06a7faf8f460c48689a4333c4f282
SHA14c654a33bbdb68eeb64b3d7720c17304d449740a
SHA25648a2183b06957e425a3bb4f73ea373ebcef921f66d8bc1fb2259b88f32a5549a
SHA51286e712d620f4cd5520dde03dc72465b0a92be42a4d1340f5bb2781b4b8c9efa149694b3302e5b5668634cd57efad9f25c43acb081a4285d44f777cbc16c59968
-
Filesize
2KB
MD59f2850140264669fb987d32a3cfa5b4e
SHA133f846898f4600204a083dc4eaba633dcab35f90
SHA2569cd24e1b16651ca8a1ee6db8695c57033b98b9da3cb59b1d86591804436f5ccb
SHA5125c825dabc2061c6376cf17c4a6c712735a182022bc6cf45aa49e2a098202af5bb4545ea8ae6b87078548ee61791648ec3ac47e1ec62e4709efe776121ca20070