Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe
Resource
win10v2004-20240426-en
General
-
Target
c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe
-
Size
9.4MB
-
MD5
94d209ac5cd848317a7639b6a643960c
-
SHA1
db97abdeda046aee264e9b25072b78a4489a2a8a
-
SHA256
c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43
-
SHA512
763f5ab1b322c802cf074b2545bb078b61271b26a63d54defc17dca0030ab4d4733951d55ecf107884b0e948d6c5946f39a44201e1763d8891a8e833236aeeae
-
SSDEEP
196608:c9xvu742tJevE8n2jpeChoKNryRa44hI8:qvqJOnquUB
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259398446.bat family_gh0strat -
Processes:
resource yara_rule behavioral1/memory/2668-51-0x0000000000400000-0x0000000001627000-memory.dmp detect_ak_stuff -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
GLk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\svchist\Parameters\ServiceDll = "C:\\Windows\\system32\\259398446.bat" GLk.exe -
Executes dropped EXE 3 IoCs
Processes:
GLk.exeHD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exesvchist.exepid process 2208 GLk.exe 2668 HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe 2176 svchist.exe -
Loads dropped DLL 11 IoCs
Processes:
c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exeGLk.exesvchost.exeHD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exesvchist.exeWerFault.exepid process 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe 2208 GLk.exe 2980 svchost.exe 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe 2668 HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe 2980 svchost.exe 2176 svchist.exe 2520 WerFault.exe 2520 WerFault.exe 2520 WerFault.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe upx behavioral1/memory/2924-23-0x0000000003EC0000-0x00000000050E7000-memory.dmp upx behavioral1/memory/2668-24-0x0000000000400000-0x0000000001627000-memory.dmp upx behavioral1/memory/2668-31-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2668-34-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2668-33-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2668-32-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2668-30-0x0000000010000000-0x00000000105A1000-memory.dmp upx behavioral1/memory/2668-51-0x0000000000400000-0x0000000001627000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
Processes:
svchost.exeGLk.exedescription ioc process File created C:\Windows\SysWOW64\svchist.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchist.exe svchost.exe File created C:\Windows\SysWOW64\259398446.bat GLk.exe File opened for modification C:\Windows\SysWOW64\ini.ini GLk.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2520 2668 WerFault.exe HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exepid process 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exeHD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exepid process 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe 2668 HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe 2668 HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exesvchost.exeHD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exedescription pid process target process PID 2924 wrote to memory of 2208 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe GLk.exe PID 2924 wrote to memory of 2208 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe GLk.exe PID 2924 wrote to memory of 2208 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe GLk.exe PID 2924 wrote to memory of 2208 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe GLk.exe PID 2924 wrote to memory of 2668 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe PID 2924 wrote to memory of 2668 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe PID 2924 wrote to memory of 2668 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe PID 2924 wrote to memory of 2668 2924 c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe PID 2980 wrote to memory of 2176 2980 svchost.exe svchist.exe PID 2980 wrote to memory of 2176 2980 svchost.exe svchist.exe PID 2980 wrote to memory of 2176 2980 svchost.exe svchist.exe PID 2980 wrote to memory of 2176 2980 svchost.exe svchist.exe PID 2668 wrote to memory of 2520 2668 HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe WerFault.exe PID 2668 wrote to memory of 2520 2668 HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe WerFault.exe PID 2668 wrote to memory of 2520 2668 HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe WerFault.exe PID 2668 wrote to memory of 2520 2668 HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe"C:\Users\Admin\AppData\Local\Temp\c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\GLk.exeC:\Users\Admin\AppData\Local\Temp\\GLk.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exeC:\Users\Admin\AppData\Local\Temp\\HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 4323⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchist.exeC:\Windows\system32\svchist.exe "c:\windows\system32\259398446.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_X.datFilesize
1.2MB
MD57e77a529093ae4048a9cf756bb7058bd
SHA1853ebd86d78bb8fbced937bde257634599001e09
SHA2569d6cc1b56054ee63996263c26c1d75cdd8220c2f4718545cfc9150ee3e216178
SHA512d26443427d56e859344c4535fa2176649b136063de6324901323732cf68dd5498f2475aeeb94ac40ab78c2d1968d7a763ad5c99d1ebe90090190d4dc9d7d95f3
-
\Users\Admin\AppData\Local\Temp\E2EECore.2.7.2.dllFilesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a
-
\Users\Admin\AppData\Local\Temp\GLk.exeFilesize
337KB
MD5b8e58a96761799f4ad0548dba39d650c
SHA1c00032d40cfbe4ccfd3ce3e4c8defb2a2ef9fc1f
SHA256334e8e7c65b087985766d652f70b710bdba6aea55a2fa17b97ba2961e8eee9df
SHA5121cd94994ed3f6594e37e6cd1d266ff96bb37c5e99d9ce6fd4637ed615ee8c6496b54a025fdccced6fca200f8f2da8011177c67c943676b30bfb0655393765fe3
-
\Users\Admin\AppData\Local\Temp\HD_c51d2a5bd5ee1a58fa3a95c9860aa795ebd264e4ae0a6c173189c1e903876f43.exeFilesize
8.3MB
MD568182c831aecfbcb52540d7f628c8b86
SHA16eb46e3ee58f4f5f93a570b051cce0210d37180c
SHA25683e5dddf72dc7224af106de7d387f5854f20619020abb3f5ac97bd4ac1e760af
SHA51241c938a00d436edae5afdaa714dfa8f650b960acd48685bc89392b33bbc43a12d57add32eaf66fc7816e8057fb245f1d5db8c6d9e8669ba9f78a8f55a8f0ff86
-
\Windows\SysWOW64\259398446.batFilesize
51KB
MD5a4f95328aca88cd6e446b521bb72dcf9
SHA155e6d457f452df8db80a8dcbb94e618cd2d44b1e
SHA25604449e655aa2249f48a7d05ac37d6ed1d0cd7c249248dd5264a5a266230d2234
SHA512ad02861af17d3b8de33fef3cf943fdf2c359c713d68fc1b72bf0a367b1f0e430df671f100063629595f7717363ba643ffcc560e65a14680efd078a7a4721ce11
-
\Windows\SysWOW64\svchist.exeFilesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
memory/2668-30-0x0000000010000000-0x00000000105A1000-memory.dmpFilesize
5.6MB
-
memory/2668-31-0x0000000010000000-0x00000000105A1000-memory.dmpFilesize
5.6MB
-
memory/2668-34-0x0000000010000000-0x00000000105A1000-memory.dmpFilesize
5.6MB
-
memory/2668-33-0x0000000010000000-0x00000000105A1000-memory.dmpFilesize
5.6MB
-
memory/2668-32-0x0000000010000000-0x00000000105A1000-memory.dmpFilesize
5.6MB
-
memory/2668-36-0x0000000050000000-0x0000000050109000-memory.dmpFilesize
1.0MB
-
memory/2668-24-0x0000000000400000-0x0000000001627000-memory.dmpFilesize
18.2MB
-
memory/2668-51-0x0000000000400000-0x0000000001627000-memory.dmpFilesize
18.2MB
-
memory/2924-25-0x0000000003EC0000-0x00000000050E7000-memory.dmpFilesize
18.2MB
-
memory/2924-0-0x0000000000400000-0x000000000054F000-memory.dmpFilesize
1.3MB
-
memory/2924-52-0x0000000003EC0000-0x00000000050E7000-memory.dmpFilesize
18.2MB
-
memory/2924-23-0x0000000003EC0000-0x00000000050E7000-memory.dmpFilesize
18.2MB