Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 12:20

General

  • Target

    gost.sh

  • Size

    36KB

  • MD5

    7e0de3d5cbcabfb2ca1b51621d75cd4f

  • SHA1

    16044db594820733add6ead599d0d1a4eab97ef8

  • SHA256

    b17774a0d42efb6649686b25cba82ba6ced84a099555308c483117ddc73bc43b

  • SHA512

    5a6b61cf6a438bc2533c9c774487e2295400d3973fd159f6cd4b12428d740ed30e5168a2064911ed4a8ed023bc60c6b4e2a6ea7985ca7d7e5cef93f6ea81a952

  • SSDEEP

    384:ba3fsx+kS17gZCsOBT2pXyXI4lXkJA+Xgoz+lrFa++bJgX9+9loRk:ba3fI+kS9RwXyXpI

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\gost.sh
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\gost.sh
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\gost.sh"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2724

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          909c91b09c8c770bb286068fa08b08c7

          SHA1

          45b55a454cab50bc4d70cf14a208e453db7f1cc0

          SHA256

          ed48bfc7e6b1de6f19b1bd4a1c9d86e32470377dc971a52b1ffb500dd297909f

          SHA512

          a32b3176ed3e549a4cf7423be51192b86348ca2f46f24ef395b46d16b9e66e44fc8b06859a50513ed0180742630e8ff13e9d1e9fb27ed172cca6938e0ba50ffa