Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 02:51
Behavioral task
behavioral1
Sample
eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe
Resource
win7-20240221-en
General
-
Target
eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe
-
Size
184KB
-
MD5
c5060f477eb4f436f96f9c74b478b6b7
-
SHA1
b9c2e196d2b3ec1550cd9a4ad300dfb2e776e8ae
-
SHA256
eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5
-
SHA512
ff6e3ec98f54f8036054e83d3053bfbbb745315c16666aeea15045f397d242a8be85d6673ae926b035ff1251dac465a80d343ad7b692ae83c4d074b70b9ebe52
-
SSDEEP
3072:ScWYIOets7tPdGYnNnVzamxH/tiZ+1cfk4TwIb6rYGPeqov:FWYF1fnV7Ztmffk6wAKYeeqo
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000c000000023148-2.dat family_gh0strat behavioral2/files/0x000a0000000231fe-11.dat family_gh0strat -
Deletes itself 1 IoCs
pid Process 4896 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1452 eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe 4896 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Bkuw\Ukkpixjhy.bmp eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe File opened for modification C:\Program Files (x86)\Bkuw\Ukkpixjhy.bmp eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\windows\temp2603300.dll eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1452 eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe 1452 eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 1452 eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe Token: SeRestorePrivilege 1452 eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe Token: SeBackupPrivilege 1452 eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe Token: SeRestorePrivilege 1452 eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe Token: SeBackupPrivilege 1452 eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe Token: SeRestorePrivilege 1452 eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe Token: SeBackupPrivilege 1452 eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe Token: SeRestorePrivilege 1452 eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe"C:\Users\Admin\AppData\Local\Temp\eaf4c7323032af32bdd10830bb997423cf34b13080b9b783f4cf6bd63bb7fec5.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4896
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5887b38cf35a97c8800467b7e82db2346
SHA1b287506cd9709f2a6ed1fcc80cf22c21f5018d82
SHA2560587c530bc217a9fa0717f881d829ee9698c95db46e29408c1a3bca2192419a8
SHA512ee93bad3b06455b631d3fe47e4965bf30a33b027ae8e93b9121654fe006fc4da6cad8d25727fb673c67e155009faddd4ed024aa30e91b05fa5c9a0cb2aad14a0
-
Filesize
129B
MD56eac6693aabba3ecdc192d43fa39eee6
SHA1cc4cffaa5f914e14fc2281d46c15fafbb82c5ab7
SHA256a9693a3bc748d2eb346e2fee93b36000f5e49043cecc27e14ddb025a34573d18
SHA512b486c7c3ddc5d71157f7f2c8642164d7de6e9f9a17c7629c932b993329ff7d773429f2b3ecd70b7c771c6f9622dc65433791a9195db534da847b1fac313ee575
-
Filesize
4.6MB
MD52cc3ebbcae019770c67b713faf77de3b
SHA15bf27ba78430055ea9b26631a49a86400c47401d
SHA25659512ca970b52aef307a5fd935a03c156cf9066d9dbe17cfc0a016c210afadc0
SHA512f03c8db84458aa4b2a58cb84d7b49e194efd22f3633f7332005a3d296875625fcdaf9e07ebaf8d55ba5e71c8608d84811b9cdd15f2a9b2161ab66b120c7efbaa