Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 06:42
Static task
static1
Behavioral task
behavioral1
Sample
ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exe
Resource
win10v2004-20240226-en
General
-
Target
ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exe
-
Size
1.4MB
-
MD5
630ed53c9019a774b97c00c8bce42a77
-
SHA1
01a0f37f6f48a432aee71ebe92bc44940aca56a0
-
SHA256
ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e
-
SHA512
238e36e63fe71b014481c4184f9ea6af9c0423d9b2e17eeb28e7ca4b29456f44d324f899d4e490eb5d7a971b7f02ff276f43e6b18b9898c2e8806911b771aa0d
-
SSDEEP
24576:dYFbkIsaPiXSVnC7Yp9zkNmZG8RRln5yzHJG:dYREXSVMDi3WG
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\240654843.bat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
look2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240654843.bat" look2.exe -
Executes dropped EXE 2 IoCs
Processes:
look2.exesvchcst.exepid process 3224 look2.exe 2184 svchcst.exe -
Loads dropped DLL 3 IoCs
Processes:
look2.exesvchost.exesvchcst.exepid process 3224 look2.exe 5072 svchost.exe 2184 svchcst.exe -
Drops file in System32 directory 4 IoCs
Processes:
look2.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\240654843.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
Drops file in Program Files directory 1 IoCs
Processes:
ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exepid process 5112 ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exe 5112 ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exesvchost.exedescription pid process target process PID 5112 wrote to memory of 3224 5112 ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exe look2.exe PID 5112 wrote to memory of 3224 5112 ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exe look2.exe PID 5112 wrote to memory of 3224 5112 ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exe look2.exe PID 5072 wrote to memory of 2184 5072 svchost.exe svchcst.exe PID 5072 wrote to memory of 2184 5072 svchost.exe svchcst.exe PID 5072 wrote to memory of 2184 5072 svchost.exe svchcst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exe"C:\Users\Admin\AppData\Local\Temp\ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3224
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:2880
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\240654843.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:1732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5630ed53c9019a774b97c00c8bce42a77
SHA101a0f37f6f48a432aee71ebe92bc44940aca56a0
SHA256ad70b5db7939e087606d5cf4cca39846886bf40c7377c4c7a4583d282c81fb2e
SHA512238e36e63fe71b014481c4184f9ea6af9c0423d9b2e17eeb28e7ca4b29456f44d324f899d4e490eb5d7a971b7f02ff276f43e6b18b9898c2e8806911b771aa0d
-
Filesize
337KB
MD52f3b6f16e33e28ad75f3fdaef2567807
SHA185e907340faf1edfc9210db85a04abd43d21b741
SHA25686492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857
SHA512db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4
-
Filesize
51KB
MD5054bebd5589ff6a9434071b9ed70ac21
SHA1905430cb32f995ac3ce40843b2c993fe5ea3ac21
SHA2561199eb7041e11b71e86d34befa762d781a7c0e4ca5af591f6e455e7f38015530
SHA512e09f9a97b41b6fac387d9f9aec59c69f8b9144a5276f447632329b77cfed585ea9da49553704da0fcd576ddfb730e986df3e597a70fefed6329ee1de25aa5647
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641