Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exe
Resource
win10v2004-20240226-en
General
-
Target
7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exe
-
Size
1.2MB
-
MD5
bce258b763c591ef6f02e070630c9d60
-
SHA1
9c5bc58bb7d9b5136bbfbd83b24852db756e3eee
-
SHA256
7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed
-
SHA512
92a2b4882efde8561f19b4c85177138999e59abced94f107af23f95aadad71d0615be6fe65f3a3e55b4bf6f0b7a3e4ffed3d2f60abab2a0dd3e7320f3a2a7871
-
SSDEEP
24576:5YFbkIsaPiXSVnC7Yp9zkNmZG8RRln1yze:5YREXSVMDi3X
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\240658812.bat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
look2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240658812.bat" look2.exe -
Executes dropped EXE 2 IoCs
Processes:
look2.exesvchcst.exepid process 4584 look2.exe 220 svchcst.exe -
Loads dropped DLL 3 IoCs
Processes:
look2.exesvchost.exesvchcst.exepid process 4584 look2.exe 5024 svchost.exe 220 svchcst.exe -
Drops file in System32 directory 4 IoCs
Processes:
look2.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\240658812.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
Drops file in Program Files directory 1 IoCs
Processes:
7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exepid process 5020 7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exe 5020 7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exesvchost.exedescription pid process target process PID 5020 wrote to memory of 4584 5020 7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exe look2.exe PID 5020 wrote to memory of 4584 5020 7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exe look2.exe PID 5020 wrote to memory of 4584 5020 7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exe look2.exe PID 5024 wrote to memory of 220 5024 svchost.exe svchcst.exe PID 5024 wrote to memory of 220 5024 svchost.exe svchcst.exe PID 5024 wrote to memory of 220 5024 svchost.exe svchcst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exe"C:\Users\Admin\AppData\Local\Temp\7c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4584
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:412
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\240658812.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3488 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:1732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5bce258b763c591ef6f02e070630c9d60
SHA19c5bc58bb7d9b5136bbfbd83b24852db756e3eee
SHA2567c0eb2732c569e8cf700cc0e14c0feb4b14fe082120709a4e44c48926096dfed
SHA51292a2b4882efde8561f19b4c85177138999e59abced94f107af23f95aadad71d0615be6fe65f3a3e55b4bf6f0b7a3e4ffed3d2f60abab2a0dd3e7320f3a2a7871
-
Filesize
337KB
MD52f3b6f16e33e28ad75f3fdaef2567807
SHA185e907340faf1edfc9210db85a04abd43d21b741
SHA25686492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857
SHA512db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4
-
Filesize
51KB
MD58878044b4a6011537ccd44f7bac719e9
SHA1c5e1a29e3752e3d888628161ff71e221cdc15f87
SHA2563608bd0102bb76865971ace2dde3e98dc782f7a7ae9787dd81586fb00b23f083
SHA51250da269b3013837cd6b0c500e988d336e85c86048f860bb4ba7f9d37095117fb16742e558cb8c6ce256fe626039c0482f8fbd9082bca6b979c3b8d28bd569d9c
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641