Analysis
-
max time kernel
3s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 04:29
Static task
static1
Behavioral task
behavioral1
Sample
GHInjectorx64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GHInjectorx64.exe
Resource
win10v2004-20241007-en
General
-
Target
GHInjectorx64.exe
-
Size
35.2MB
-
MD5
5abc8be3cb3ad48aebf2a63f05341582
-
SHA1
47e3f6e271fa04748ee1b83afc7d0a21059f9ae5
-
SHA256
5c8608607a328036d0c4ddde044703033a6b105f62e167fb9abd6739036215c8
-
SHA512
c8beeba10268f76fb1bfa7036a3094335eb383bcf81010decc5ad2b1fd99075ad57a44196e544fd2e9e83663dab3fc6f121c15eaecf4f5af8c285397e63bee14
-
SSDEEP
786432:6A6Vk51XxQgLespvvwY0vFfVtMI9aznj381fvKFf+/CfBGkZOHk+:eV6Kfsp50BzMSazrcfvKh+/CpGsS
Malware Config
Extracted
xworm
147.185.221.21:27469
-
Install_directory
%AppData%
-
install_file
astroGG.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0006000000017570-19.dat family_xworm behavioral1/memory/2496-28-0x0000000000D20000-0x0000000000D36000-memory.dmp family_xworm -
Executes dropped EXE 2 IoCs
pid Process 2152 AstroBootStrapper.exe 2496 astroGG.exe -
Loads dropped DLL 1 IoCs
pid Process 2340 GHInjectorx64.exe -
Detects Pyinstaller 7 IoCs
resource yara_rule behavioral1/files/0x00090000000120f9-5.dat pyinstaller behavioral1/files/0x00090000000120f9-8.dat pyinstaller behavioral1/files/0x00090000000120f9-7.dat pyinstaller behavioral1/files/0x00090000000120f9-145.dat pyinstaller behavioral1/files/0x00090000000120f9-144.dat pyinstaller behavioral1/files/0x00090000000120f9-149.dat pyinstaller behavioral1/files/0x00090000000120f9-148.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2496 astroGG.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2152 2340 GHInjectorx64.exe 30 PID 2340 wrote to memory of 2152 2340 GHInjectorx64.exe 30 PID 2340 wrote to memory of 2152 2340 GHInjectorx64.exe 30 PID 2340 wrote to memory of 2496 2340 GHInjectorx64.exe 31 PID 2340 wrote to memory of 2496 2340 GHInjectorx64.exe 31 PID 2340 wrote to memory of 2496 2340 GHInjectorx64.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\GHInjectorx64.exe"C:\Users\Admin\AppData\Local\Temp\GHInjectorx64.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\AstroBootStrapper.exe"C:\Users\Admin\AppData\Local\Temp\AstroBootStrapper.exe"2⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\AstroBootStrapper.exe"C:\Users\Admin\AppData\Local\Temp\AstroBootStrapper.exe"3⤵PID:1380
-
-
-
C:\Users\Admin\AppData\Local\Temp\astroGG.exe"C:\Users\Admin\AppData\Local\Temp\astroGG.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.6MB
MD51b11ea5bedcb36af6d7e05a149a78fa7
SHA14b19c9bec2d7ea82ce8551d6687a932f7043ded4
SHA25640a35d34d949c1e888d34cf780b9ce2c1409bdf79343ec4077c449526d1e0ac9
SHA512260679d3234dbc75be1a32eb29071ef0b80d8203e5eea4ddb2ab1cb1f966ecf2cf96c1d1e10fb0a19f276b068729c923381c74a8d626e18dc64f5120a6130a37
-
Filesize
26.2MB
MD57d31e5fb0fc7ebf55f9df2de1c7ffefa
SHA12730470b31deff316fdce78bc3a9796cbcbb1d7e
SHA2564ef2b9593aecf2990520689c9e7eefbad1507f59545696fa1116cd7d12ec9e4c
SHA512bb2eaa12e2711ad83dad8a203d7bf38b9b6cd49611d4d2a09cc91fe978e23f61ab03e1c0c9a13adb938710fdf08ce6af22f8be816cc046d0685b0b35d036f4d4
-
Filesize
24.6MB
MD51fd7e5c93d284b80ffa60904e05f2b4c
SHA14155bbb71d03ff6f809c1653512a62477905b5d6
SHA2568ec270b0f9b7cb9ddecad346890fd74ac21ccc8536dd6dd814af7ccbd2dc7f72
SHA5124078a11c87af2ea853a5da07040831fcc0151e40a14424d11c770953c3e2a4becfdbabe745229849ef1fd6bbc46bbacd491b9362cbf7f0af15124d6e2c9cf4f1
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35
-
Filesize
60KB
MD5aa214096148443fef487b52dbecee5a4
SHA1ebd815c0faa3cb17f4a6c6c41ef1faaa307c68c8
SHA25605171a217f14814ed567a59e4230ebcb2a552720e8419761016b2ba8677f9a2a
SHA512ae0a44736c385da5119f27190af09e18ce7c2c26ae81fd3b194683cd27da6ea839206348578c4e5ec0cfd428ef89d0c2e318d711a2915fae3df7ab407b74cc0e
-
Filesize
22.4MB
MD526dfeb7388ba1ecd144537ba514b37d5
SHA19a2e80efb218d74496bd92560ab10a6d809434e5
SHA25689977e76d1c78c9bb8a1918b36bc8626990a3a2f91de590111a8694c0dccf6dc
SHA512f12968a5c41c83d5c68643b638af2b03b47a3c6d1435edafb6a33f4dca38962d6642f0700bb265564c6b035f28042aeaa34782e92001cd9903ecef1e65e280e6
-
Filesize
9.9MB
MD5b702612732d516a46d36c70b882d8cd3
SHA1a7de6487b97eebdf77d0ffae66462834af75bc71
SHA256f1cb9acbefef6f4a632cc2f3e098b7fa6e0839780735845eb61dbed7010525df
SHA512b3302ee6b6e37e63b9caf48b0aa938814fe72b2fcb00fc50963895cf5a0d9b186fa336d88e3d454b802de91c0b79f91ace5da38f0a1a266ebc34184ad5c9fe41
-
Filesize
10.5MB
MD5f84014f038ffef1127fea96a098d36ef
SHA1f27c6b7970f54f287ac89bcb91a332f5a0bf1467
SHA25632447aa6ea3f7fd56c700486caac9fb058ea5892bef023ef3a4c5eba5c623584
SHA512b6e2a5918e22a6498a2377cf4cd9e04d826602d5c826fde210901eeef1fd1bd3cb72714de509382644c6b66e45acfd9aabb9ecb65a6871354fb725b660abab9c
-
Filesize
26.4MB
MD559bb53999cb5da41a7e99d47859caa93
SHA1c1785eb3a7044c6f70cfc65be8edbb5a0325b79f
SHA256ed4a9db7e382ee80fa487a9b566262b52e11374fac0451027da9c2a3025ac7c2
SHA512365c7b998322439f18fcca87721244ca5b1ed947db09379b7c41d3ef11b59ddb8d8c4ae4e532c96e8d6be33d3e612414cf0715bf06d40a7218f464e3e6687ecb