Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 08:02
Static task
static1
Behavioral task
behavioral1
Sample
d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe
Resource
win10v2004-20240508-en
General
-
Target
d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe
-
Size
1.2MB
-
MD5
93bd7c53b5d5075a012039b0ed7a19bc
-
SHA1
21db18e3b04912518b940d3c818e8abcf97b5161
-
SHA256
d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357
-
SHA512
97711ef14a35e45951c0e380d70e1687ec9ed15aa866b68ff36521623517ec27d683a4d794a9dfabb98dfc1dab3881721dbad34f3d757cc97c2574aea05110b9
-
SSDEEP
24576:rEdksIGN71VVbzYEL+5dNmZG8RRl9T7t8/:rEywVVvUji3TS/
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259399164.bat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
GLk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\svchist\Parameters\ServiceDll = "C:\\Windows\\system32\\259399164.bat" GLk.exe -
Executes dropped EXE 2 IoCs
Processes:
GLk.exesvchist.exepid process 3004 GLk.exe 2716 svchist.exe -
Loads dropped DLL 5 IoCs
Processes:
d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exeGLk.exesvchost.exesvchist.exepid process 2928 d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe 3004 GLk.exe 2932 svchost.exe 2932 svchost.exe 2716 svchist.exe -
Drops file in System32 directory 4 IoCs
Processes:
GLk.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\259399164.bat GLk.exe File opened for modification C:\Windows\SysWOW64\ini.ini GLk.exe File created C:\Windows\SysWOW64\svchist.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchist.exe svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exepid process 2928 d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe 2928 d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exesvchost.exedescription pid process target process PID 2928 wrote to memory of 3004 2928 d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe GLk.exe PID 2928 wrote to memory of 3004 2928 d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe GLk.exe PID 2928 wrote to memory of 3004 2928 d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe GLk.exe PID 2928 wrote to memory of 3004 2928 d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe GLk.exe PID 2932 wrote to memory of 2716 2932 svchost.exe svchist.exe PID 2932 wrote to memory of 2716 2932 svchost.exe svchist.exe PID 2932 wrote to memory of 2716 2932 svchost.exe svchist.exe PID 2932 wrote to memory of 2716 2932 svchost.exe svchist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe"C:\Users\Admin\AppData\Local\Temp\d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\GLk.exeC:\Users\Admin\AppData\Local\Temp\\GLk.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3004
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵PID:1748
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\svchist.exeC:\Windows\system32\svchist.exe "c:\windows\system32\259399164.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD5b8e58a96761799f4ad0548dba39d650c
SHA1c00032d40cfbe4ccfd3ce3e4c8defb2a2ef9fc1f
SHA256334e8e7c65b087985766d652f70b710bdba6aea55a2fa17b97ba2961e8eee9df
SHA5121cd94994ed3f6594e37e6cd1d266ff96bb37c5e99d9ce6fd4637ed615ee8c6496b54a025fdccced6fca200f8f2da8011177c67c943676b30bfb0655393765fe3
-
Filesize
1.2MB
MD593bd7c53b5d5075a012039b0ed7a19bc
SHA121db18e3b04912518b940d3c818e8abcf97b5161
SHA256d3e5503b6b258142b49e703eed70fe0c860722df333b10866daf33cab0523357
SHA51297711ef14a35e45951c0e380d70e1687ec9ed15aa866b68ff36521623517ec27d683a4d794a9dfabb98dfc1dab3881721dbad34f3d757cc97c2574aea05110b9
-
Filesize
51KB
MD57f6c8d37ef1e6ae871d77fbccff54a52
SHA1aa8c1a52b3798a47ff929813272ab5c735167d95
SHA25684ba9bcbe2eb0e91b8469c80598061d45644ea213a781222aef9e7a6e0e5e7df
SHA5120cbbe4731a7af27f5c9078a1969dd107a154ba8e17ec11db1adb28cd84d19d14f149a946e862cdc133bef4ec2770ec08a848eb047e35090845ac89aa07354c3e
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d