Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe
Resource
win10v2004-20241007-en
General
-
Target
b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe
-
Size
2.7MB
-
MD5
7e77836efbcd079168bb79cb5a07e910
-
SHA1
beb7e3e76003c9b6ba73c03b07d3e50dcb59b3b1
-
SHA256
b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1e
-
SHA512
ac5f4eceea1058079c43122882ac752da2fd8cc9e768ef55cc0b954a049535fd31d41b8f8b1f67802bdae1663ced87084b3a83a5bbbb01030b36e8dbcbaf0399
-
SSDEEP
49152:/YREXSVMDi39x7kYKy2Re589Y+wejfxYD2qQfs+RiieNXs:A2SVMD8n7kYec589YLeLxYD2qQfs+Rs8
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\240613640.bat family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
Processes:
look2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240613640.bat" look2.exe -
Executes dropped EXE 3 IoCs
Processes:
look2.exeHD_b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exesvchcst.exepid process 3280 look2.exe 2936 HD_b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe 1856 svchcst.exe -
Loads dropped DLL 3 IoCs
Processes:
look2.exesvchost.exesvchcst.exepid process 3280 look2.exe 3480 svchost.exe 1856 svchcst.exe -
Drops file in System32 directory 4 IoCs
Processes:
look2.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\240613640.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
Drops file in Program Files directory 1 IoCs
Processes:
b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
HD_b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exesvchcst.exeb782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exelook2.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language look2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exepid process 1676 b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe 1676 b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exepid process 1676 b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe 1676 b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exesvchost.exedescription pid process target process PID 1676 wrote to memory of 3280 1676 b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe look2.exe PID 1676 wrote to memory of 3280 1676 b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe look2.exe PID 1676 wrote to memory of 3280 1676 b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe look2.exe PID 1676 wrote to memory of 2936 1676 b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe HD_b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe PID 1676 wrote to memory of 2936 1676 b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe HD_b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe PID 1676 wrote to memory of 2936 1676 b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe HD_b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe PID 3480 wrote to memory of 1856 3480 svchost.exe svchcst.exe PID 3480 wrote to memory of 1856 3480 svchost.exe svchcst.exe PID 3480 wrote to memory of 1856 3480 svchost.exe svchcst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe"C:\Users\Admin\AppData\Local\Temp\b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\HD_b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exeC:\Users\Admin\AppData\Local\Temp\HD_b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:3904
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\240613640.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5a3b312045874c1b649aa97591b6598b6
SHA15f7d6e1704562bc40ea31b9acfa26ad36ceaf00c
SHA2568f00e0d6fbe748bc26e5c2b9f19b3c754b96d0e539aaaa48a0d7a1ee6053bf15
SHA51269bb57d9ab8530580ae96d1955a937abc8e0f1bba175c1525d8eb9a1cbb904299451a9b34500ad38c63ca0e6f40f71cf77023a28d0ead060acc00867ed39d671
-
C:\Users\Admin\AppData\Local\Temp\HD_b782eb18e415722aa14a0b8a51f3d6a8f108efc3b5c0f8304dafc939bf1cab1eN.exe
Filesize1.4MB
MD503f51f5997e82243ed5c0c4f327a3ce9
SHA13bd9738ac07ea8bb7ba582039996f37cc3b4d567
SHA2569f8932918e2b1101822b3c86530e58520da108640ead49da228001bbc9a1833f
SHA5126c4364c56a630d436e358cae01a47dbfac674ede74df778be1d2ee22f6e3ac925a3c535ef030851a4330e3321cd96cfb2aaf073b7f198e62e4bfc7b5ddf29ccf
-
Filesize
337KB
MD52f3b6f16e33e28ad75f3fdaef2567807
SHA185e907340faf1edfc9210db85a04abd43d21b741
SHA25686492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857
SHA512db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4
-
Filesize
51KB
MD59ebd0c6389011dd483d3cdae373eedd3
SHA1400f8e2f6f75bdbedfa1ea9f5334b1072f05e24c
SHA2563b1da02565b0d0fda8397d99c9724fc33e3759e965942cd5faddfe62c86323bc
SHA512fe9eae31241397aa3cc568610f9a74363f27aa60a7d6eacf22cc0e2e49f22571496c71f0b50f41b0c1fd164ab1254083d732352126a421fa62d73cddbb7f925f
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641