Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 07:01
Static task
static1
Behavioral task
behavioral1
Sample
761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe
Resource
win10v2004-20241007-en
General
-
Target
761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe
-
Size
1.0MB
-
MD5
0f055a69a984adaf9b645caf78036c97
-
SHA1
f42623384d44e2387c52295874a2a7f1cd8ce929
-
SHA256
761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e
-
SHA512
6faa6d3cf7d29e5c42531f41fa599d4e705fb5fb58f3b2c515e35ba366be9cb5ec80fb8b1a775e8dfe0ad1a07cf21bc909b26faed2cf73923d16959d637479b2
-
SSDEEP
12288:R1ec/eFqGwf63oXk2yFqR+lIaaiEOqN/L0FgEhBCpJJNn8/MPr4OsnM:be7qGK63o024qR+aaHEx/wFvUPEOs
Malware Config
Extracted
gh0strat
116.62.87.138
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2424-8-0x0000000010000000-0x000000001001D000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 3 IoCs
Processes:
·ÀºÚÆÁ2.exeShowsWinse.exe·ÀºÚÆÁ2.exepid process 2244 ·ÀºÚÆÁ2.exe 3040 ShowsWinse.exe 1616 ·ÀºÚÆÁ2.exe -
Loads dropped DLL 2 IoCs
Processes:
761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exepid process 2424 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe 2424 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
·ÀºÚÆÁ2.exe·ÀºÚÆÁ2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FHPP = "C:\\Users\\Admin\\AppData\\Local\\Temp\\·ÀºÚÆÁ2.exe" ·ÀºÚÆÁ2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FHPP = "C:\\Windows\\·ÀºÚÆÁ2.exe" ·ÀºÚÆÁ2.exe -
Drops file in Windows directory 4 IoCs
Processes:
761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exeShowsWinse.exedescription ioc process File created C:\Windows\ShowsWinse.exe 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe File opened for modification C:\Windows\ShowsWinse.exe 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe File created C:\Windows\·ÀºÚÆÁ2.exe ShowsWinse.exe File created C:\Windows\ShowsWinse.exe ShowsWinse.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.exeShowsWinse.exe·ÀºÚÆÁ2.exeschtasks.exe761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe·ÀºÚÆÁ2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ShowsWinse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ·ÀºÚÆÁ2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ·ÀºÚÆÁ2.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2900 schtasks.exe 2836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
·ÀºÚÆÁ2.exe761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exepid process 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2424 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
·ÀºÚÆÁ2.exe·ÀºÚÆÁ2.exepid process 2244 ·ÀºÚÆÁ2.exe 2244 ·ÀºÚÆÁ2.exe 1616 ·ÀºÚÆÁ2.exe 1616 ·ÀºÚÆÁ2.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exetaskeng.exeShowsWinse.exedescription pid process target process PID 2424 wrote to memory of 2244 2424 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe ·ÀºÚÆÁ2.exe PID 2424 wrote to memory of 2244 2424 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe ·ÀºÚÆÁ2.exe PID 2424 wrote to memory of 2244 2424 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe ·ÀºÚÆÁ2.exe PID 2424 wrote to memory of 2244 2424 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe ·ÀºÚÆÁ2.exe PID 2424 wrote to memory of 2836 2424 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe schtasks.exe PID 2424 wrote to memory of 2836 2424 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe schtasks.exe PID 2424 wrote to memory of 2836 2424 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe schtasks.exe PID 2424 wrote to memory of 2836 2424 761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe schtasks.exe PID 2240 wrote to memory of 3040 2240 taskeng.exe ShowsWinse.exe PID 2240 wrote to memory of 3040 2240 taskeng.exe ShowsWinse.exe PID 2240 wrote to memory of 3040 2240 taskeng.exe ShowsWinse.exe PID 2240 wrote to memory of 3040 2240 taskeng.exe ShowsWinse.exe PID 3040 wrote to memory of 1616 3040 ShowsWinse.exe ·ÀºÚÆÁ2.exe PID 3040 wrote to memory of 1616 3040 ShowsWinse.exe ·ÀºÚÆÁ2.exe PID 3040 wrote to memory of 1616 3040 ShowsWinse.exe ·ÀºÚÆÁ2.exe PID 3040 wrote to memory of 1616 3040 ShowsWinse.exe ·ÀºÚÆÁ2.exe PID 3040 wrote to memory of 2900 3040 ShowsWinse.exe schtasks.exe PID 3040 wrote to memory of 2900 3040 ShowsWinse.exe schtasks.exe PID 3040 wrote to memory of 2900 3040 ShowsWinse.exe schtasks.exe PID 3040 wrote to memory of 2900 3040 ShowsWinse.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe"C:\Users\Admin\AppData\Local\Temp\761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\·ÀºÚÆÁ2.exeC:\Users\Admin\AppData\Local\Temp\·ÀºÚÆÁ2.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2244
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /tn "ShowsWin" /tr C:\Windows\ShowsWinse.exe /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2836
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1023DB5F-F15D-4537-8117-EDE4EA4B2DD9} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\ShowsWinse.exeC:\Windows\ShowsWinse.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\·ÀºÚÆÁ2.exeC:\Windows\·ÀºÚÆÁ2.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /tn "ShowsWin" /tr C:\Windows\ShowsWinse.exe /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2900
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
780KB
MD552b8ff9e93b3ed7d23f1be5737fe9fd6
SHA19dc246cbba5e4e103cbab5642f9bc00375aa01e8
SHA2569fac08b760dbd1ba11421fd0a1f3c4297527752dd31c38f2d16098420a5d8342
SHA5122ebf43f646968a9d9a68a996f2f5522a14b8a04fe732bc3718744d929ee3e53eb367d3ea0521fa29b4b091243cd6ce17a66875cc09a91cd570ed48403b2c995f
-
Filesize
1.0MB
MD50f055a69a984adaf9b645caf78036c97
SHA1f42623384d44e2387c52295874a2a7f1cd8ce929
SHA256761a9722d17a995cdb504aa2827e526c1ef7b390e2277ab2fb0f85b0737abe4e
SHA5126faa6d3cf7d29e5c42531f41fa599d4e705fb5fb58f3b2c515e35ba366be9cb5ec80fb8b1a775e8dfe0ad1a07cf21bc909b26faed2cf73923d16959d637479b2