Analysis
-
max time kernel
110s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe
Resource
win7-20240708-en
General
-
Target
5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe
-
Size
1.0MB
-
MD5
5d31cf31cfa14685818f82695c8d69ae
-
SHA1
4e0593d4b76cc0158bcc1fd69ab55291f2620355
-
SHA256
5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f
-
SHA512
75ad7af2890d5c094b6560b074b83fd55fbe117b5de56a91935454fc7b9364e98a1c021603b608f9d2a2cd40a83e4718b8123cfbc0e966b8cc2ec84370c22c10
-
SSDEEP
24576:rZ1pilG4hHwrlli5t5cx1y7wkpn4rCYSP:UlG4EnZMp
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2204-122-0x0000000003A20000-0x0000000003A9B000-memory.dmp family_gh0strat behavioral2/memory/2204-136-0x0000000003980000-0x0000000003A17000-memory.dmp family_gh0strat behavioral2/memory/2204-137-0x0000000004640000-0x00000000046B8000-memory.dmp family_gh0strat -
Gh0strat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe -
Executes dropped EXE 1 IoCs
Processes:
ishare_user.exepid process 2204 ishare_user.exe -
Loads dropped DLL 25 IoCs
Processes:
ishare_user.exepid process 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ishare_user.exedescription ioc process File opened (read-only) \??\S: ishare_user.exe File opened (read-only) \??\V: ishare_user.exe File opened (read-only) \??\G: ishare_user.exe File opened (read-only) \??\M: ishare_user.exe File opened (read-only) \??\O: ishare_user.exe File opened (read-only) \??\Q: ishare_user.exe File opened (read-only) \??\R: ishare_user.exe File opened (read-only) \??\T: ishare_user.exe File opened (read-only) \??\W: ishare_user.exe File opened (read-only) \??\Z: ishare_user.exe File opened (read-only) \??\E: ishare_user.exe File opened (read-only) \??\J: ishare_user.exe File opened (read-only) \??\P: ishare_user.exe File opened (read-only) \??\U: ishare_user.exe File opened (read-only) \??\X: ishare_user.exe File opened (read-only) \??\H: ishare_user.exe File opened (read-only) \??\I: ishare_user.exe File opened (read-only) \??\L: ishare_user.exe File opened (read-only) \??\N: ishare_user.exe File opened (read-only) \??\Y: ishare_user.exe File opened (read-only) \??\B: ishare_user.exe File opened (read-only) \??\K: ishare_user.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exeishare_user.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ishare_user.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ishare_user.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ishare_user.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ishare_user.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ishare_user.exepid process 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe 2204 ishare_user.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
ishare_user.exepid process 2204 ishare_user.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exeishare_user.exepid process 700 5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe 700 5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe 700 5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe 2204 ishare_user.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exedescription pid process target process PID 700 wrote to memory of 2204 700 5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe ishare_user.exe PID 700 wrote to memory of 2204 700 5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe ishare_user.exe PID 700 wrote to memory of 2204 700 5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe ishare_user.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe"C:\Users\Admin\AppData\Local\Temp\5aab4177554129c5a7de5987b1590846616c9bc13195620d058a0693577a315f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Public\assist4\ishare_user.exe"C:\Users\Public\assist4\ishare_user.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576KB
MD5a6da73fc63ff8b82f9f4e41d310ea83b
SHA19651cb0d524a1bf8058b35828770f329483feaef
SHA256998637a2a9607a6906e37ec9fb82ef425c2a186d9957f51c49ea038683f84c70
SHA5121489dc6f2f45bff1cac2ddd2f3c3d394994084387f863f03d282980c6c5ae49278b95b47feb38c727fb05df094e16e897dc2f303fe295776087104a87c2c5e11
-
Filesize
92B
MD5e5182d72b06b42c5a104e4057965013f
SHA1aa1f6a25b921a337fac11c233facc8ad36b755be
SHA256c49387b35c8aa1e067eb02fa998db4ca13c9e7dde6a5267cb60ab68fb48ff8d3
SHA512a08850f2b3db8425f4eed0202eb598f9f50dd41c77e444e3d08c009aef5e359ced27349eea63a302f6a3b2c13d27291d634a8b0bbd0b43cd696ce76fb609128a
-
Filesize
1.5MB
MD5a3b393d6604c40c51f9f28533161ab81
SHA119480433f1a094f135eff78e4b63c5b47411f333
SHA256a830e40e43aef4d9d7b7eeb6d94c17cd2cb11be7f3ee8adce2399ec5c0a6049c
SHA51212c460443ae98c0a57abe98e8d70802367d9fe2a14faf66164a094ffdb10ee6d8a6b41e4c96e58a423218f3653ea56d804ed15614ff6957948025f78389c3313
-
Filesize
438KB
MD51fb93933fd087215a3c7b0800e6bb703
SHA1a78232c352ed06cedd7ca5cd5cb60e61ef8d86fb
SHA2562db7fd3c9c3c4b67f2d50a5a50e8c69154dc859780dd487c28a4e6ed1af90d01
SHA51279cd448e44b5607863b3cd0f9c8e1310f7e340559495589c428a24a4ac49beb06502d787824097bb959a1c9cb80672630dac19a405468a0b64db5ebd6493590e
-
Filesize
271KB
MD527378e77fed60b91b9eacef55b10d3a2
SHA1603050de753ae268e09aca9e37b30ac4e647b6b7
SHA256553920c1b7dbcabcd18e8a17a3f0b3bd91f3fd2a3375a6163c8e85d441cb8a18
SHA51295be8277a4ceaf29a2c7bbba6f8e06fb894bb883ff457e08851352dd751375f94c551a78204fc30838aa2c4a6741f49e30bfa6f0b6a6f0287c5d77b0e9ed6c6d
-
Filesize
893KB
MD5057d333133ba16ad86fa644e8b28adf7
SHA17542ae74dbcaef4fd60e82937080efa1c2ac954f
SHA25651d34fdf50a1542a86f2befa3e0f7615832558d29e41cf92c9206b44b67e1350
SHA51283a61c8da999bdcc3bb47b47d8aeea3fb8605404cda949acb91bb0b7aaba7d1c854f7cf44d8d5ba81d5be5d2c3dfc5babf66f72bf1137c2786b34bd32b853e78
-
Filesize
24KB
MD532f12897dbfad3149821d503013c6a28
SHA152fc6755add14e6f6eb2b2f5a20d8022a32c8225
SHA25693fcab146f4061b93e6566b1846cfefd05dae52afd763fdd261e6a0543436671
SHA512c0547fb67c4d80e2d2744179c4b21d1e9b8694f53a6c843adc7e28df48b0e56c95c25b6cfc956f440d856add2bfc339b8178c820c28a09250854b5a57587db59
-
Filesize
35KB
MD51390bc15e3d2b403d962c6c6e9e77fee
SHA1dab2a8a69cb014c682544c94efc2a9219fd603cc
SHA256ae1cec46aaa7841b0d4e2dd719272821469be8121b32a60609b1bc3bfd5638d3
SHA512e794d64bd63b8bbacdd59e8ad1b2b23011f07a8de70217082f56b710cadfec4f4579756eb693ceb9a223933366bb4058d26e7c5867d4c4e67988aa4532cbad5a
-
Filesize
551KB
MD5a1b899fd31bff8b4d87e2edd78006b31
SHA1199280dabac2c32324c59ec8da76c0126e5710e7
SHA25609c6a24b0714da6e4bef6ed8070f6986c005cd974c35a4f7a9f406b88ee038b3
SHA51240d9466ee6ae644c19e9c2f505370ed647379c6d3389a908ad32f24ed0cf6ef95728192a443324fde3a312b1fd31a4eb3ea616881595dac6ee1b4a047b948a17
-
Filesize
307KB
MD5216c638d1e32032145687d2e3851394a
SHA1fdcb1cb31625a8023880a716205b29a1b7f71aa2
SHA256965fd4c884b66a65c7b6800a43f1c6f9a0b5a5766606301494da227a8a80f35e
SHA5125b50ad6f3a5aa25de08174df90db067676fb13991b93bcadba2698b0e69c096f46892467b1d6f75227825447b9eedbf40f6415d8804115fa3201a43bd7360bd0
-
Filesize
353KB
MD5428f062a15575599e0fcbef2374754a8
SHA15dacffd79a14ac1b3b0377885460cc1bf1023810
SHA2560553c54a2082a89b04bfa0a8373185ffcfa202523e98159a5e20012df1ce99b5
SHA512492d4c4e35b55abc2f0517aa4fc3235bb88b115d7dc2b666f847f2b100d84b011eb9540675b60d3d68da4de6e49bff7253cd5428c991ac7ae521b73e0eacba27
-
Filesize
616KB
MD5e471a8665c05062f45e343b7f89ad319
SHA158a98da8295458c073d10622158a6a53a20be534
SHA2561f75c77513b2554d94c692d6e7a00b674dcec354913159aea7f324062a4fa798
SHA512f033a1e8044b070a8f2ad4fe97e06f810747988ce5bb269bd6a502b39c24158ce0a150305666b73de74252762371e5d091ed258fc11e94259c78bcaba04dfc46
-
Filesize
1.0MB
MD50aaeb781e651be69f6d643a72b15c6cb
SHA18be4066c628629ffe77254c2cc452aecc1fee8dc
SHA256e9359d5c42b6767d63525ae73eb194a88c3e68111cee4ec1a2bdbb8ecf530bb9
SHA512c6f1af6bb30005f8b89951612961ef8db706d39ace2e674cf54a14445fdfcfe8cf8c5762fe04406b9d87154a919cc47e251eaefd9cbd15e00b2ecf471854e6f5
-
Filesize
243KB
MD58651e6272e310d5c64d0c91ca975b029
SHA10e2433c8771ac420b5684c79e96eb7e206350757
SHA256b721897db5542d5b0c970ec624440442ed9ae781e55147feb9ff264f70f66cde
SHA512d99d049b9ae9f7bcf9e6737b26a90f544a08ff49e06fdc39617b869eb97676024e18ba42e680db255a8a04f323de494dd8e7b706007e9b961c78a64cdf078ff6
-
Filesize
61B
MD59edd9f96ccc32bb030f7cf90c7e42df4
SHA1ba20942915cd32ce5ba8dff3f54cddaa7faabd22
SHA256e74077547eee351d936625a5239e5e9fc5efd679f6b0977e33799fc262cf13d9
SHA512ca15467024063e471a0d57db1c8a29fe4a5bc929e17c1f4177600992a604a0efdd3373178e52dc98eaf64e82db1d7b2374bd17eea57bb6c927c711583d74c0ac
-
Filesize
346KB
MD5b575cfefd5c7b14f4743ef2ad74b2736
SHA1f433813501a7b5b96186bb02fe69ca01580627ed
SHA256a38708da0db2003a1d14ed1e9d45a9ecb30a6294d472692f804ffb0cea70334b
SHA512ea912b2589142f1a89ef84e503bf65999beb7aa76d2aa50e1e7edc178bf841debed906fc11da555a004fc715f52fa09baf3a3fe4b42c33e5c9cf811eba676e5e
-
Filesize
552KB
MD5b58a42118168c1c18a26acbc353b2ec0
SHA1c1a048e3a941972cabf9d91be5b28df189d0a3bd
SHA256762d69078a248a0c99344ae69b1f84c3f85c332b878869e054be67825423ec0b
SHA51258339b6c26f5fbda2a12bd84e88b41c4bee407ae53da3b72ca2b2ddddd49f64ea75096feb57d654aa748b7eaa83190b417933c0ac43b5819ef32db46b29db770
-
Filesize
1.2MB
MD51707bc560de9c69ae7325b6f63c8ec96
SHA1d15e908a921cd17fbcfe0000b264d52e8fd413e7
SHA256648a673ec8504f8255de37996a21895279985e011124e8ff2c7249271d5890cb
SHA512941b3a76d43626d3d8e369437b83e63689eb3f8ecf90737a2d2df8df1c38e19e02146938af12d0fa9850ba3154ad60d74c5e4b80cae4ff6e3bff9d2583538ad5
-
Filesize
3.5MB
MD5fcd72aa6a80b75556057d77b729f17c5
SHA18689cd54043136e644c82cb8eae419a5d43289ca
SHA2566a59443d3a5cf8572e2e80b5987040ddbf2630e14036204a3bf77ce27e02d918
SHA512e2c7c02ec1b997c3888ce20e8a3ac4c84a4e36a6e1c37aaf1a65983096ba64e60fbe61ca988821a1807872e9bf284cc577938db5957abcb57555321a7e36c7ba
-
Filesize
4.8MB
MD506f307b7ddb0994b448b9786cf5811b8
SHA14d70c5206e84b23916e4c686f430e5dcdc70dfc3
SHA256dde3c8e9e7d414913a29979798311d095c1b8869ee405a1c3fcbba14da90446d
SHA512b26bcfca4569ce9fb4b7196c952ce38b0e3a30aeff2e7ac4b2ea1c695c658c1d92029fb7e31ad231e62de8dff2a86ab3821aa1f9d5c944d88b263d88efeca16a
-
Filesize
1.7MB
MD518d35237d397e8396c30356ddb12dd9c
SHA18f86896fd6f884f05c48c3034b7b55b7d9e50a5a
SHA2561c1f3b6df9347b864ac879ef841196b97ed02f5be941fd490817831889b97b84
SHA512e2e1e1fdb6e161b28e90236edd0b35d3b91f507161b50615caaaa8f9484946c72ea35298838e1b538e4d2801aff9cece97b89447e78a3dc2ae4fdc962a26c5c3
-
Filesize
1.9MB
MD5b83a304b66f3c9799cae2be75bec361b
SHA1d7ccc4067af699e62f9a7f9001589d3d8c7f4ac6
SHA256b0f02252f1cee1826f3b193e682344a8d9785e424e8009b60a7700e5c88271c8
SHA512dfa3dfa9faf6a85af25fa4f12726ec27075053112e9455461e435ff424bff0635bd624c39c2e15f962b4aab3a6374b23024e7d805e0e8f2d54df1f92e7edd6f2
-
Filesize
1.9MB
MD5f6a0b1bf98161f7231039f6ffceee155
SHA17f888d40d50ae85490e2126c9f9a14ce78d4c7d0
SHA2561ad5b3f2447a6d48e3ade61cbdc4abb0f18f3dbc8b7dcd3b050d60c68197d0df
SHA51269ea3f74d40a5aecedb5ea120e01a5cd348af9542f16124973b028a3e2965d3d63a804d0bab1bdd4b548e55f8bb21365605b241891993177cfc08608d895764b
-
Filesize
1.6MB
MD527e2d298d6905a73ea98b7a2c4c889c5
SHA1600eb3e14e20f91c7e9788bf3cde864f9e1bc17c
SHA256f67e68461b7fa1bdf83b00020affc17c203e5d5fb6d051c00d2654e181115f8f
SHA512751cceddd052cb3a540b842ed9a69f0842f3c1a5d503555ba990838550b0e784dafc577e0070383af7cfe36bf51a4944b9a9fadfbcfdbcc92ba6deb52ff30f95
-
Filesize
84B
MD58723da6a462305a3f949ca344ed49f8c
SHA1bc7e227a132dd6554803768be30c698968ec347f
SHA256d3623af6e0fc742d215e7a56eb386ef39cd8bd04197d8bfbed3b823a24449270
SHA512473df6f728f7679fdeb2b904eb9854eea2f1cbed682b8e6bb5523bf2cbd425a7bb04e9f10b00675d863f6557d24afed638b55d38f10f165f357252a7b36b4855
-
Filesize
78KB
MD51b171f9a428c44acf85f89989007c328
SHA16f25a874d6cbf8158cb7c491dcedaa81ceaebbae
SHA2569d02e952396bdff3abfe5654e07b7a713c84268a225e11ed9a3bf338ed1e424c
SHA51299a06770eea07f36abc4ae0cecb2ae13c3acb362b38b731c3baed045bf76ea6b61efe4089cd2efac27701e9443388322365bdb039cd388987b24d4a43c973bd1