Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 20:09

General

  • Target

    0ebfef7d6059b82e87e05a54e80e5a7b.exe

  • Size

    2.6MB

  • MD5

    0ebfef7d6059b82e87e05a54e80e5a7b

  • SHA1

    3c1ab9c072625b9e08b72013967b04bd2e0cb69e

  • SHA256

    4695fbf41abd54d1449d8da4a5976d50aec0499e3e2959e20686237d32db3114

  • SHA512

    a695816e77c3d569ba861fab022035910858cf2db0e15dd2a58398c6f39394add35172ca209de1d0d02019f5f0a4f35beb8e3ea56c4e0c37cb645379d1d9e5c9

  • SSDEEP

    24576:3bsATQUIP6braCWyv6BpHv+LOez9OulOcsV9DK2J2aBcpsam5RvikgJkf:3vbDCv+HOulOcQMYYsP5RviP6

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • UAC bypass 3 TTPs 1 IoCs
  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ebfef7d6059b82e87e05a54e80e5a7b.exe
    "C:\Users\Admin\AppData\Local\Temp\0ebfef7d6059b82e87e05a54e80e5a7b.exe"
    1⤵
    • UAC bypass
    • Server Software Component: Terminal Services DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1724
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\mimikatz.exe privilege::debug sekurlsa::logonpasswords exit >C:\Users\Admin\AppData\Local\Temp\Pass.txt
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Users\Admin\AppData\Local\Temp\mimikatz.exe
        C:\Users\Admin\AppData\Local\Temp\mimikatz.exe privilege::debug sekurlsa::logonpasswords exit
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2516
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe c:\windows\graphicsperfsvcs.dll, XiaoDeBu Graphipcs_PerfSvcs
      2⤵
      • Blocklisted process makes network request
      • System Location Discovery: System Language Discovery
      PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Pass.txt

    Filesize

    3KB

    MD5

    adffea26d27cb5e10aac7b7d83341ca4

    SHA1

    dfd71b8ca846ce492b3366f62951ec6b778f2376

    SHA256

    d8e1704e9011808655722a63945170a4731359e1e2a91a1ebba4bd97c7b22410

    SHA512

    ccf5394248d5d570bde37f7c7b35921ddeaa0257fd44afe302df418ef144205eee48395429ae24c071ba054b48685fe7a6edfa922b3986f51da49d51b6c5f858

  • C:\Users\Admin\AppData\Local\Temp\mimikatz.exe

    Filesize

    905KB

    MD5

    50300de5e4786530ea603224ccbcbb02

    SHA1

    d343b0019084de2dd882e92a79a872370bc6028f

    SHA256

    23a243a1ce474c4da90b1003ffcbaf9a3ff25e0787844bfe74c21671fdd8b269

    SHA512

    a41f0e2140046d1074e444881e7b23f3ba79e304acca4df25dcdb522e0a1ef21b5e64245748d359cad18e4966d76fe622cbc8f542ee1cf2a38f9de5971398b8c

  • \??\c:\windows\graphicsperfsvcs.dll

    Filesize

    104KB

    MD5

    cd1b4e13446adbd451196fc3e7f59e26

    SHA1

    6cd3fd4b54ce0c7109709851781138bbb66eb0aa

    SHA256

    dda0aa71a3aaf64c5de3aade73b3619f5b135d1dee66b88725e5a804272318e3

    SHA512

    2cd76db9207d55d465e36277aaadd9bd5ed8007e8a4aa78027c5d91aa6a9772f271a4f3ae611892497b8b31d35b6e89262eee6c2366ecb04011e43741d35b439

  • memory/1956-13-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/1956-28-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/1956-34-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/2688-12-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/2688-16-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB