Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
gost.sh
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
gost.sh
Resource
win10v2004-20240508-en
General
-
Target
gost.sh
-
Size
36KB
-
MD5
7e0de3d5cbcabfb2ca1b51621d75cd4f
-
SHA1
16044db594820733add6ead599d0d1a4eab97ef8
-
SHA256
b17774a0d42efb6649686b25cba82ba6ced84a099555308c483117ddc73bc43b
-
SHA512
5a6b61cf6a438bc2533c9c774487e2295400d3973fd159f6cd4b12428d740ed30e5168a2064911ed4a8ed023bc60c6b4e2a6ea7985ca7d7e5cef93f6ea81a952
-
SSDEEP
384:ba3fsx+kS17gZCsOBT2pXyXI4lXkJA+Xgoz+lrFa++bJgX9+9loRk:ba3fI+kS9RwXyXpI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2724 AcroRd32.exe 2724 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2672 1632 cmd.exe 29 PID 1632 wrote to memory of 2672 1632 cmd.exe 29 PID 1632 wrote to memory of 2672 1632 cmd.exe 29 PID 2672 wrote to memory of 2724 2672 rundll32.exe 30 PID 2672 wrote to memory of 2724 2672 rundll32.exe 30 PID 2672 wrote to memory of 2724 2672 rundll32.exe 30 PID 2672 wrote to memory of 2724 2672 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\gost.sh1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\gost.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\gost.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5909c91b09c8c770bb286068fa08b08c7
SHA145b55a454cab50bc4d70cf14a208e453db7f1cc0
SHA256ed48bfc7e6b1de6f19b1bd4a1c9d86e32470377dc971a52b1ffb500dd297909f
SHA512a32b3176ed3e549a4cf7423be51192b86348ca2f46f24ef395b46d16b9e66e44fc8b06859a50513ed0180742630e8ff13e9d1e9fb27ed172cca6938e0ba50ffa