Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 10:13
Static task
static1
Behavioral task
behavioral1
Sample
c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exe
Resource
win10v2004-20241007-en
General
-
Target
c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exe
-
Size
1.4MB
-
MD5
5f98b947333f18509cb1f51b3a92af6e
-
SHA1
47bb87c67a8c3ff2298afe5d791259f7273056bd
-
SHA256
c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860
-
SHA512
995733d2fb57d1d4b5e834f972aea17ba0575419561c19db256675b5a1526569961c1767d2536bb7bc65d70c2507af480d4e483267898c283b3be12eebb7df38
-
SSDEEP
24576:rYFbkIsaPiXSVnC7Yp9zkNmZG8RRlnyyzwdsTDP6LBmxr:rYREXSVMDi36dWDPmBmxr
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\240622828.bat family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
Processes:
look2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240622828.bat" look2.exe -
Executes dropped EXE 2 IoCs
Processes:
look2.exesvchcst.exepid process 5112 look2.exe 1704 svchcst.exe -
Loads dropped DLL 3 IoCs
Processes:
look2.exesvchost.exesvchcst.exepid process 5112 look2.exe 2188 svchost.exe 1704 svchcst.exe -
Drops file in System32 directory 4 IoCs
Processes:
look2.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\240622828.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchcst.exec4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exelook2.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language look2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exepid process 4328 c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exe 4328 c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exesvchost.exedescription pid process target process PID 4328 wrote to memory of 5112 4328 c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exe look2.exe PID 4328 wrote to memory of 5112 4328 c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exe look2.exe PID 4328 wrote to memory of 5112 4328 c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exe look2.exe PID 2188 wrote to memory of 1704 2188 svchost.exe svchcst.exe PID 2188 wrote to memory of 1704 2188 svchost.exe svchcst.exe PID 2188 wrote to memory of 1704 2188 svchost.exe svchcst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exe"C:\Users\Admin\AppData\Local\Temp\c4b8a8fb9126dadad42f3a01266e50e89d0d32b80a8dbd60f78b793f335e0860.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5112
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:2040
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\240622828.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD52f3b6f16e33e28ad75f3fdaef2567807
SHA185e907340faf1edfc9210db85a04abd43d21b741
SHA25686492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857
SHA512db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4
-
Filesize
51KB
MD5f30576aadf33b45104f7c4f08404b232
SHA1e656019f6197fd8ae394a353eab67f52edcf8b95
SHA256f4816f994da41d543e3cb70bb9b3958628a2503c69613895aab7ed59d3559edb
SHA512404514c1cce34c1718efda7fb97ae982cc66a4c045a88636f55f0a5d655540bef7221558e12413546d14a1ed736136f2e2eb32e5f7b8113265590f13ee58ff22
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641