Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 18:43
Static task
static1
Behavioral task
behavioral1
Sample
093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe
Resource
win10v2004-20240426-en
General
-
Target
093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe
-
Size
1.1MB
-
MD5
dfcc258ed7c2c1d0ddbda108b78a1f16
-
SHA1
4bb1e2d0f5452c8d8d682158bea2cacfd8d80427
-
SHA256
093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975
-
SHA512
e330e676e803134451e956c9df4c23bee97a26334b5586370084d0909da1595102fdae408819efbc03aaf9f4ab351a208c81721ecd67daf7b0123dfe5068478b
-
SSDEEP
24576:NEdksIGN71VVbzYEL+5dNmZG8RRl9T7t/Bi:NEywVVvUji3TJBi
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023475-5.dat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchist\Parameters\ServiceDll = "C:\\Windows\\system32\\240602937.bat" GLk.exe -
Executes dropped EXE 2 IoCs
pid Process 112 GLk.exe 1484 svchist.exe -
Loads dropped DLL 3 IoCs
pid Process 112 GLk.exe 3284 svchost.exe 1484 svchist.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\240602937.bat GLk.exe File opened for modification C:\Windows\SysWOW64\ini.ini GLk.exe File created C:\Windows\SysWOW64\svchist.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchist.exe svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2004 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe 2004 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2004 wrote to memory of 112 2004 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe 82 PID 2004 wrote to memory of 112 2004 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe 82 PID 2004 wrote to memory of 112 2004 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe 82 PID 3284 wrote to memory of 1484 3284 svchost.exe 88 PID 3284 wrote to memory of 1484 3284 svchost.exe 88 PID 3284 wrote to memory of 1484 3284 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe"C:\Users\Admin\AppData\Local\Temp\093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\GLk.exeC:\Users\Admin\AppData\Local\Temp\\GLk.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:112
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵PID:1104
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\svchist.exeC:\Windows\system32\svchist.exe "c:\windows\system32\240602937.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD5b8e58a96761799f4ad0548dba39d650c
SHA1c00032d40cfbe4ccfd3ce3e4c8defb2a2ef9fc1f
SHA256334e8e7c65b087985766d652f70b710bdba6aea55a2fa17b97ba2961e8eee9df
SHA5121cd94994ed3f6594e37e6cd1d266ff96bb37c5e99d9ce6fd4637ed615ee8c6496b54a025fdccced6fca200f8f2da8011177c67c943676b30bfb0655393765fe3
-
Filesize
1.1MB
MD5dfcc258ed7c2c1d0ddbda108b78a1f16
SHA14bb1e2d0f5452c8d8d682158bea2cacfd8d80427
SHA256093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975
SHA512e330e676e803134451e956c9df4c23bee97a26334b5586370084d0909da1595102fdae408819efbc03aaf9f4ab351a208c81721ecd67daf7b0123dfe5068478b
-
Filesize
51KB
MD5ea08bd6a28c6eda098eda0d6212ec747
SHA1dfeb51a058e8ab28dc073c17481f7e85daaeee5f
SHA2561f22c0076c9b88510f2bad6b772b4d34b945fcecb68b3c01d405ac3202588f1e
SHA5121b44b507931112d97e6985c6b8845e48faa383c56fbc5022ad6bda9f1c587d11c73028cb0743c1fca45c1615fcbd9b56ddeefa6ddc250dde3c998cc89a31f107
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641