Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 20:09
Behavioral task
behavioral1
Sample
0ebfef7d6059b82e87e05a54e80e5a7b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ebfef7d6059b82e87e05a54e80e5a7b.exe
Resource
win10v2004-20240802-en
General
-
Target
0ebfef7d6059b82e87e05a54e80e5a7b.exe
-
Size
2.6MB
-
MD5
0ebfef7d6059b82e87e05a54e80e5a7b
-
SHA1
3c1ab9c072625b9e08b72013967b04bd2e0cb69e
-
SHA256
4695fbf41abd54d1449d8da4a5976d50aec0499e3e2959e20686237d32db3114
-
SHA512
a695816e77c3d569ba861fab022035910858cf2db0e15dd2a58398c6f39394add35172ca209de1d0d02019f5f0a4f35beb8e3ea56c4e0c37cb645379d1d9e5c9
-
SSDEEP
24576:3bsATQUIP6braCWyv6BpHv+LOez9OulOcsV9DK2J2aBcpsam5RvikgJkf:3vbDCv+HOulOcQMYYsP5RviP6
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x00080000000236ce-1.dat family_gh0strat -
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0ebfef7d6059b82e87e05a54e80e5a7b.exe -
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral2/files/0x00070000000236d2-8.dat mimikatz -
Blocklisted process makes network request 2 IoCs
flow pid Process 2798 3520 rundll32.exe 6154 3520 rundll32.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Graphipcs_PerfSvcs\Parameters\ServiceDll = "C:\\Windows\\GraphicsPerfSvcs.dll" 0ebfef7d6059b82e87e05a54e80e5a7b.exe -
Executes dropped EXE 1 IoCs
pid Process 848 mimikatz.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 svchost.exe 3520 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RunExec = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\0ebfef7d6059b82e87e05a54e80e5a7b.exe\"" 0ebfef7d6059b82e87e05a54e80e5a7b.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0ebfef7d6059b82e87e05a54e80e5a7b.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\GraphicsPerfSvcs.dll 0ebfef7d6059b82e87e05a54e80e5a7b.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ebfef7d6059b82e87e05a54e80e5a7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 848 mimikatz.exe 848 mimikatz.exe 848 mimikatz.exe 848 mimikatz.exe 848 mimikatz.exe 848 mimikatz.exe 3040 svchost.exe 3040 svchost.exe 3040 svchost.exe 3040 svchost.exe 3040 svchost.exe 3040 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3040 svchost.exe Token: SeDebugPrivilege 848 mimikatz.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2396 0ebfef7d6059b82e87e05a54e80e5a7b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2396 wrote to memory of 3680 2396 0ebfef7d6059b82e87e05a54e80e5a7b.exe 90 PID 2396 wrote to memory of 3680 2396 0ebfef7d6059b82e87e05a54e80e5a7b.exe 90 PID 2396 wrote to memory of 3680 2396 0ebfef7d6059b82e87e05a54e80e5a7b.exe 90 PID 3040 wrote to memory of 3520 3040 svchost.exe 92 PID 3040 wrote to memory of 3520 3040 svchost.exe 92 PID 3040 wrote to memory of 3520 3040 svchost.exe 92 PID 3680 wrote to memory of 848 3680 cmd.exe 93 PID 3680 wrote to memory of 848 3680 cmd.exe 93 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0ebfef7d6059b82e87e05a54e80e5a7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0ebfef7d6059b82e87e05a54e80e5a7b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ebfef7d6059b82e87e05a54e80e5a7b.exe"C:\Users\Admin\AppData\Local\Temp\0ebfef7d6059b82e87e05a54e80e5a7b.exe"1⤵
- UAC bypass
- Server Software Component: Terminal Services DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\mimikatz.exe privilege::debug sekurlsa::logonpasswords exit >C:\Users\Admin\AppData\Local\Temp\Pass.txt2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\mimikatz.exeC:\Users\Admin\AppData\Local\Temp\mimikatz.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\graphicsperfsvcs.dll, XiaoDeBu Graphipcs_PerfSvcs2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3880,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:81⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
610B
MD5e6755266b069eeed568b171f9dd69008
SHA1cd936565bd9838042ab6512836f368d47034ff4c
SHA256d691240500c369458e0f98ca9a9c8df6ad3494f8700bc982f27f3800ab3681d1
SHA512f2884be7017502b76703c11497f82cb29561bf7101f637ab103eefb24538a4fcc438a40f817a7a659a7908936d7d9011d1024573f920cf36bcd2997d2e463d7c
-
Filesize
905KB
MD550300de5e4786530ea603224ccbcbb02
SHA1d343b0019084de2dd882e92a79a872370bc6028f
SHA25623a243a1ce474c4da90b1003ffcbaf9a3ff25e0787844bfe74c21671fdd8b269
SHA512a41f0e2140046d1074e444881e7b23f3ba79e304acca4df25dcdb522e0a1ef21b5e64245748d359cad18e4966d76fe622cbc8f542ee1cf2a38f9de5971398b8c
-
Filesize
104KB
MD5cd1b4e13446adbd451196fc3e7f59e26
SHA16cd3fd4b54ce0c7109709851781138bbb66eb0aa
SHA256dda0aa71a3aaf64c5de3aade73b3619f5b135d1dee66b88725e5a804272318e3
SHA5122cd76db9207d55d465e36277aaadd9bd5ed8007e8a4aa78027c5d91aa6a9772f271a4f3ae611892497b8b31d35b6e89262eee6c2366ecb04011e43741d35b439