Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe
Resource
win10v2004-20240508-en
General
-
Target
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe
-
Size
1.3MB
-
MD5
afe9b7f9b5ba33d1d08f17c76e9ad70b
-
SHA1
63b79d1812a7f30e8e637907b5eec85136dc111f
-
SHA256
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3
-
SHA512
88845e7e8d8b88aec7ab769148957f45063196984f068e220050e3481324e53a20d9a559810d1026edbb2e20737c512c8bca475c58833936e48ce6eb600ddda7
-
SSDEEP
24576:JYFbkIsaPiXSVnC7Yp9zkNmZG8RRlnFyzywTtf5BaQJ:JYREXSVMDi3hwTtf5XJ
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259396590.bat family_gh0strat behavioral1/memory/2624-60-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral1/memory/2636-73-0x0000000000400000-0x0000000000458000-memory.dmp family_gh0strat behavioral1/memory/1632-78-0x0000000000400000-0x0000000000458000-memory.dmp family_gh0strat behavioral1/memory/2624-85-0x0000000000400000-0x0000000000458000-memory.dmp family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
look2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\259396590.bat" look2.exe -
Executes dropped EXE 8 IoCs
Processes:
look2.exeHD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exesvchost.exeHD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exesvchost.exesystem.exesystem.exesvchcst.exepid process 2312 look2.exe 2620 HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe 2616 svchost.exe 2624 HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe 2476 svchost.exe 2636 system.exe 1632 system.exe 1772 svchcst.exe -
Loads dropped DLL 9 IoCs
Processes:
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exelook2.exesvchost.exesvchost.exesvchcst.exepid process 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe 2312 look2.exe 2244 svchost.exe 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe 2616 svchost.exe 2616 svchost.exe 2244 svchost.exe 1772 svchcst.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe upx behavioral1/memory/2624-43-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2636-73-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1632-74-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1632-78-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2624-85-0x0000000000400000-0x0000000000458000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
Processes:
look2.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\259396590.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
Drops file in Program Files directory 8 IoCs
Processes:
svchost.exe3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exeHD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe File created C:\Program Files (x86)\system.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe File opened for modification C:\Program Files (x86)\system.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe -
Drops file in Windows directory 1 IoCs
Processes:
HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exedescription ioc process File created C:\Windows\svchost.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exepid process 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exepid process 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exeHD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exesvchost.exesystem.exesvchost.exedescription pid process target process PID 3028 wrote to memory of 2312 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe look2.exe PID 3028 wrote to memory of 2312 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe look2.exe PID 3028 wrote to memory of 2312 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe look2.exe PID 3028 wrote to memory of 2312 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe look2.exe PID 3028 wrote to memory of 2620 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 3028 wrote to memory of 2620 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 3028 wrote to memory of 2620 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 3028 wrote to memory of 2620 3028 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 2620 wrote to memory of 2616 2620 HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe svchost.exe PID 2620 wrote to memory of 2616 2620 HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe svchost.exe PID 2620 wrote to memory of 2616 2620 HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe svchost.exe PID 2620 wrote to memory of 2616 2620 HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe svchost.exe PID 2616 wrote to memory of 2624 2616 svchost.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 2616 wrote to memory of 2624 2616 svchost.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 2616 wrote to memory of 2624 2616 svchost.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 2616 wrote to memory of 2624 2616 svchost.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 2636 wrote to memory of 1632 2636 system.exe system.exe PID 2636 wrote to memory of 1632 2636 system.exe system.exe PID 2636 wrote to memory of 1632 2636 system.exe system.exe PID 2636 wrote to memory of 1632 2636 system.exe system.exe PID 2244 wrote to memory of 1772 2244 svchost.exe svchcst.exe PID 2244 wrote to memory of 1772 2244 svchost.exe svchcst.exe PID 2244 wrote to memory of 1772 2244 svchost.exe svchcst.exe PID 2244 wrote to memory of 1772 2244 svchost.exe svchcst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe"C:\Users\Admin\AppData\Local\Temp\3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exeC:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe"C:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2624
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:2984
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\259396590.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2476
-
C:\Program Files (x86)\system.exe"C:\Program Files (x86)\system.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\system.exe"C:\Program Files (x86)\system.exe" Win72⤵
- Executes dropped EXE
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e6a4db504d48c2299997d668751caac3
SHA1dc60b83d12e40941d0c97dc4047326fcdc1d7494
SHA2569ab254376616341171a9e16bdd9542816ba4ce219d491659f1183ff0ba894de3
SHA512b942195ebc39dc112fbecd5680d4b44d1e6e865a03fb1f9ed70feae88adcb2a80ac16e2cec9ae6ea2fb946dbfca113f38240e97e522d5ae454fa2d8bdc4b49cb
-
Filesize
35KB
MD583b4da0c5e91e676c355a34ad0fe73da
SHA109322303503ed0a70613110ca72e1bc790348882
SHA2565ad575dccfe237328de529ea01d57917c5d639ed0d8454a01af98aaea9724110
SHA51220183c78adbabf88ac8999521cc3e1884215f78c264f06cb017dd8749b995adc96559c5a9a39ecda3d2c34390cc5caf7dbf6b90b975d55e2ed129e1993eb5b08
-
\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe
Filesize136KB
MD5423a9bf58be87e5b8585e70fff8d466f
SHA1bbe7c4f509aec4c6fd9e9d9e9bc749b6090735b7
SHA2564a15baf8f4734a08cd43a7f7b9b0d43972a4a4abf195f1ba55c506421046f139
SHA512049f220120b0627cc011cf1737343ef4a1851ea3eee7ae6a072e0f971d0ee649a139540098dc99d503ee2dc28ee32f612de59a7a6b50690523befde6b99c0e0b
-
\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe
Filesize100KB
MD5a1576bc9aeda73698b27eb5b6b096c35
SHA1eb5dc72328b433d2b52bca8ac2041ce13666c52a
SHA25660b32b505452bf1997b95b1f1813180477f03f2451d1e34e27c7d6ca58cdb6f3
SHA5120458807ebe694bb4ead4f961dff70475c52ad8b13f425434e5109c4310958e5df1f6374e0a437981e9532a690badb0f05a436e7b6acacfc3b19cb4e8b268c537
-
Filesize
337KB
MD52f3b6f16e33e28ad75f3fdaef2567807
SHA185e907340faf1edfc9210db85a04abd43d21b741
SHA25686492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857
SHA512db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4
-
Filesize
51KB
MD54a2b936c362ed08507600a40265d6cb7
SHA1e0a462983834f7db7ed0431aefe1cda8a33f582b
SHA256701bdb36fa0dad452c086f340653b16576232ab8afe7b3507e188856661efb77
SHA512e9bb943bfac8e1bfa6553d94e1f57b1fce3befea2d06fbaa3b8cf70e81781cbcdef958f5382fb306ac72cf328ff26a17217854236d39aa6bbc1987e22c02a920
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d