Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe
Resource
win10v2004-20240508-en
General
-
Target
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe
-
Size
1.3MB
-
MD5
afe9b7f9b5ba33d1d08f17c76e9ad70b
-
SHA1
63b79d1812a7f30e8e637907b5eec85136dc111f
-
SHA256
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3
-
SHA512
88845e7e8d8b88aec7ab769148957f45063196984f068e220050e3481324e53a20d9a559810d1026edbb2e20737c512c8bca475c58833936e48ce6eb600ddda7
-
SSDEEP
24576:JYFbkIsaPiXSVnC7Yp9zkNmZG8RRlnFyzywTtf5BaQJ:JYREXSVMDi3hwTtf5XJ
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\240599296.bat family_gh0strat behavioral2/memory/2200-44-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral2/memory/2200-53-0x0000000000400000-0x0000000000458000-memory.dmp family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
look2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240599296.bat" look2.exe -
Executes dropped EXE 6 IoCs
Processes:
look2.exeHD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exesvchost.exeHD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exesvchost.exesvchcst.exepid process 860 look2.exe 2684 HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe 5100 svchost.exe 2200 HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe 4668 svchost.exe 3396 svchcst.exe -
Loads dropped DLL 3 IoCs
Processes:
look2.exesvchost.exesvchcst.exepid process 860 look2.exe 2380 svchost.exe 3396 svchcst.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe upx behavioral2/memory/2200-40-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/2200-53-0x0000000000400000-0x0000000000458000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe" HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe -
Drops file in System32 directory 4 IoCs
Processes:
look2.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\240599296.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
Drops file in Program Files directory 26 IoCs
Processes:
svchost.exe3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\dotnet\dotnet.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe -
Drops file in Windows directory 1 IoCs
Processes:
HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exedescription ioc process File created C:\Windows\svchost.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exepid process 2912 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe 2912 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exepid process 2912 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe 2912 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exeHD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exesvchost.exesvchost.exedescription pid process target process PID 2912 wrote to memory of 860 2912 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe look2.exe PID 2912 wrote to memory of 860 2912 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe look2.exe PID 2912 wrote to memory of 860 2912 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe look2.exe PID 2912 wrote to memory of 2684 2912 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 2912 wrote to memory of 2684 2912 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 2912 wrote to memory of 2684 2912 3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 2684 wrote to memory of 5100 2684 HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe svchost.exe PID 2684 wrote to memory of 5100 2684 HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe svchost.exe PID 2684 wrote to memory of 5100 2684 HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe svchost.exe PID 5100 wrote to memory of 2200 5100 svchost.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 5100 wrote to memory of 2200 5100 svchost.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 5100 wrote to memory of 2200 5100 svchost.exe HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe PID 2380 wrote to memory of 3396 2380 svchost.exe svchcst.exe PID 2380 wrote to memory of 3396 2380 svchost.exe svchcst.exe PID 2380 wrote to memory of 3396 2380 svchost.exe svchcst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe"C:\Users\Admin\AppData\Local\Temp\3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exeC:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe"C:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2200
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:3740
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\240599296.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3396
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe
Filesize136KB
MD5423a9bf58be87e5b8585e70fff8d466f
SHA1bbe7c4f509aec4c6fd9e9d9e9bc749b6090735b7
SHA2564a15baf8f4734a08cd43a7f7b9b0d43972a4a4abf195f1ba55c506421046f139
SHA512049f220120b0627cc011cf1737343ef4a1851ea3eee7ae6a072e0f971d0ee649a139540098dc99d503ee2dc28ee32f612de59a7a6b50690523befde6b99c0e0b
-
C:\Users\Admin\AppData\Local\Temp\HD_3e01e61b965abea7769b292481e3e777df6ad898e6e750581f5da852a3b6f1a3.exe
Filesize100KB
MD5a1576bc9aeda73698b27eb5b6b096c35
SHA1eb5dc72328b433d2b52bca8ac2041ce13666c52a
SHA25660b32b505452bf1997b95b1f1813180477f03f2451d1e34e27c7d6ca58cdb6f3
SHA5120458807ebe694bb4ead4f961dff70475c52ad8b13f425434e5109c4310958e5df1f6374e0a437981e9532a690badb0f05a436e7b6acacfc3b19cb4e8b268c537
-
Filesize
1.2MB
MD5e6a4db504d48c2299997d668751caac3
SHA1dc60b83d12e40941d0c97dc4047326fcdc1d7494
SHA2569ab254376616341171a9e16bdd9542816ba4ce219d491659f1183ff0ba894de3
SHA512b942195ebc39dc112fbecd5680d4b44d1e6e865a03fb1f9ed70feae88adcb2a80ac16e2cec9ae6ea2fb946dbfca113f38240e97e522d5ae454fa2d8bdc4b49cb
-
Filesize
337KB
MD52f3b6f16e33e28ad75f3fdaef2567807
SHA185e907340faf1edfc9210db85a04abd43d21b741
SHA25686492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857
SHA512db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4
-
Filesize
51KB
MD54a2b936c362ed08507600a40265d6cb7
SHA1e0a462983834f7db7ed0431aefe1cda8a33f582b
SHA256701bdb36fa0dad452c086f340653b16576232ab8afe7b3507e188856661efb77
SHA512e9bb943bfac8e1bfa6553d94e1f57b1fce3befea2d06fbaa3b8cf70e81781cbcdef958f5382fb306ac72cf328ff26a17217854236d39aa6bbc1987e22c02a920
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
35KB
MD583b4da0c5e91e676c355a34ad0fe73da
SHA109322303503ed0a70613110ca72e1bc790348882
SHA2565ad575dccfe237328de529ea01d57917c5d639ed0d8454a01af98aaea9724110
SHA51220183c78adbabf88ac8999521cc3e1884215f78c264f06cb017dd8749b995adc96559c5a9a39ecda3d2c34390cc5caf7dbf6b90b975d55e2ed129e1993eb5b08