Analysis
-
max time kernel
128s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 01:00
Behavioral task
behavioral1
Sample
17a00a985d33c7a7b97c291a3da67f75.exe
Resource
win7-20240220-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
17a00a985d33c7a7b97c291a3da67f75.exe
Resource
win10v2004-20240611-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
17a00a985d33c7a7b97c291a3da67f75.exe
-
Size
171KB
-
MD5
17a00a985d33c7a7b97c291a3da67f75
-
SHA1
35a97e9e165cd3e5298ad0f89d0b13e27073a206
-
SHA256
31dd35798c37a47fc7be37d537a8886c1c3c4ba0c8ac2905d153c034125dd4e7
-
SHA512
329931391bf43f184052b7a0fac6a8cc170381d5dbbde112113036eb946e1a2b7544a899b89515c06a5d226fcfc5c217f9f6995169420dc1e3ac4459ca521c42
-
SSDEEP
3072:0ZrQhQbIWncyHgCyntbw1XqHoljLpvo1sG0kY68wPq2rw:0ZEnIgCyVwsHovO1Ts68wPq2k
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/4124-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4124-4-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NetCreate1\Parameters\ServiceDll = "C:\\Documents and Settings\\LocalService\\twain_32.dll" 17a00a985d33c7a7b97c291a3da67f75.exe -
Kills process with taskkill 1 IoCs
pid Process 1584 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4124 17a00a985d33c7a7b97c291a3da67f75.exe 4124 17a00a985d33c7a7b97c291a3da67f75.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4124 17a00a985d33c7a7b97c291a3da67f75.exe Token: SeDebugPrivilege 1584 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4124 wrote to memory of 1584 4124 17a00a985d33c7a7b97c291a3da67f75.exe 82 PID 4124 wrote to memory of 1584 4124 17a00a985d33c7a7b97c291a3da67f75.exe 82 PID 4124 wrote to memory of 1584 4124 17a00a985d33c7a7b97c291a3da67f75.exe 82 PID 4124 wrote to memory of 3676 4124 17a00a985d33c7a7b97c291a3da67f75.exe 85 PID 4124 wrote to memory of 3676 4124 17a00a985d33c7a7b97c291a3da67f75.exe 85 PID 4124 wrote to memory of 3676 4124 17a00a985d33c7a7b97c291a3da67f75.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\17a00a985d33c7a7b97c291a3da67f75.exe"C:\Users\Admin\AppData\Local\Temp\17a00a985d33c7a7b97c291a3da67f75.exe"1⤵
- Server Software Component: Terminal Services DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im RSTray.EXE2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\17A00A~1.EXE > nul2⤵PID:3676
-
-
C:\Windows\SysWOW64\SVCHOST.EXEC:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS1⤵PID:4640