Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe
Resource
win10v2004-20240426-en
General
-
Target
68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe
-
Size
11.6MB
-
MD5
babb30e61fdef65e913d6ea164301077
-
SHA1
edb712f4837ae0ca2205408dd9a388ee33c2bd76
-
SHA256
68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a
-
SHA512
b522175ff1c488eb780bc0a7f24a1979b15299568144c9dcf10e995cda1960aa4349a23ac61606398fe7c0ae850a1c6668538bc30ac3f7faf4ac9bcc8d6cfd36
-
SSDEEP
196608:K2tnjp+sHMWh+lmnqg/ivIbuUN0tZo+mNbM3bwIihTtvHkP5KhvXRRdCqM4ABrGl:bnjsyM9l2R6gamsbmNbGihpHr9Rj5A6I
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259396091.bat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
GLk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\svchist\Parameters\ServiceDll = "C:\\Windows\\system32\\259396091.bat" GLk.exe -
Executes dropped EXE 3 IoCs
Processes:
GLk.exeHD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exesvchist.exepid process 1744 GLk.exe 2640 HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe 2732 svchist.exe -
Loads dropped DLL 6 IoCs
Processes:
68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exeGLk.exesvchost.exesvchist.exepid process 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe 1744 GLk.exe 2168 svchost.exe 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe 2168 svchost.exe 2732 svchist.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe upx behavioral1/memory/2040-19-0x0000000004420000-0x0000000005487000-memory.dmp upx behavioral1/memory/2640-24-0x0000000000400000-0x0000000001467000-memory.dmp upx behavioral1/memory/2640-32-0x0000000000400000-0x0000000001467000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
Processes:
GLk.exesvchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ini.ini GLk.exe File created C:\Windows\SysWOW64\svchist.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchist.exe svchost.exe File created C:\Windows\SysWOW64\259396091.bat GLk.exe -
Processes:
HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exepid process 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exeHD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exepid process 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe 2640 HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe 2640 HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exesvchost.exedescription pid process target process PID 2040 wrote to memory of 1744 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe GLk.exe PID 2040 wrote to memory of 1744 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe GLk.exe PID 2040 wrote to memory of 1744 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe GLk.exe PID 2040 wrote to memory of 1744 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe GLk.exe PID 2040 wrote to memory of 2640 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe PID 2040 wrote to memory of 2640 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe PID 2040 wrote to memory of 2640 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe PID 2040 wrote to memory of 2640 2040 68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe PID 2168 wrote to memory of 2732 2168 svchost.exe svchist.exe PID 2168 wrote to memory of 2732 2168 svchost.exe svchist.exe PID 2168 wrote to memory of 2732 2168 svchost.exe svchist.exe PID 2168 wrote to memory of 2732 2168 svchost.exe svchist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe"C:\Users\Admin\AppData\Local\Temp\68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\GLk.exeC:\Users\Admin\AppData\Local\Temp\\GLk.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exeC:\Users\Admin\AppData\Local\Temp\\HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:2640
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵PID:2524
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\svchist.exeC:\Windows\system32\svchist.exe "c:\windows\system32\259396091.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD5b8e58a96761799f4ad0548dba39d650c
SHA1c00032d40cfbe4ccfd3ce3e4c8defb2a2ef9fc1f
SHA256334e8e7c65b087985766d652f70b710bdba6aea55a2fa17b97ba2961e8eee9df
SHA5121cd94994ed3f6594e37e6cd1d266ff96bb37c5e99d9ce6fd4637ed615ee8c6496b54a025fdccced6fca200f8f2da8011177c67c943676b30bfb0655393765fe3
-
Filesize
1.2MB
MD593bd7c53b5d5075a012039b0ed7a19bc
SHA121db18e3b04912518b940d3c818e8abcf97b5161
SHA256d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357
SHA51297711ef14a35e45951c0e380d70e1687ec9ed15aa866b68ff36521623517ec27d683a4d794a9dfabb98dfc1dab3881721dbad34f3d757cc97c2574aea05110b9
-
\Users\Admin\AppData\Local\Temp\HD_68ac4865ef5f7046ccf887d0da4398091b6209d6992246fc596aec49bf2d817a.exe
Filesize10.4MB
MD56acfaf993d52998a4a084b2df45ef4b1
SHA1f1e732b33315fcb97a094fc32232531ad9e68524
SHA256bf9b32a64e76698d773c7572e1dfd7665a3e951bf1dd6ef51738dc99af58c76e
SHA5129e70133b5a4846f3daa28778e11028f96cbe27da77699c9976a867b5655f704848136a27dbd9ded4c40603eddf045a66d642db7cd7e71e3e674abe57291ec291
-
Filesize
51KB
MD5303dbeece437fa01c742f12f45e3a381
SHA1bcef4152470e4751c535ac4418496036fa64d284
SHA2564044f6210f0a92ab85cd07c7378b337f213266b9f77ac04ddbdc4fb0029ecd88
SHA51229ae71aedc0db4340bf5dc40bbb9ec96685224d680e4486d185bbcdf740b50cf09171289704e8e381f6f6477939ffb096dd436dcd380a097ca2f63c972713e2c
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d