Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 09:44
Behavioral task
behavioral1
Sample
f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe
Resource
win10v2004-20241007-en
General
-
Target
f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe
-
Size
2.4MB
-
MD5
aa89115709cd72b95d39415755ffbda0
-
SHA1
9417f30d4c9499b88abd9de8a51fa30e0c8898c5
-
SHA256
f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20
-
SHA512
1a3875299cabfd7658d9d50b7c46ce4aa4a70c89dfe06905cbd0132a618ddac6ad22acd166af7436c8bedf4fc94384e77f682111b4179fbd3d3c4a47bbaa5394
-
SSDEEP
24576:oYFbkIsaPiXSVnC7Yp9zjNmZG8RRl9LyzCCgjBAeu8iuUHGzkuBhzy2F+yVICFP5:oYREXSVMKi3VCI7XBE2IuF64rIlmdii
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b40-5.dat family_gh0strat -
Gh0strat family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b44-16.dat mimikatz -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240612703.bat" look2.exe -
Executes dropped EXE 3 IoCs
pid Process 2640 look2.exe 2060 HD_f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe 1728 svchcst.exe -
Loads dropped DLL 3 IoCs
pid Process 2640 look2.exe 1680 svchost.exe 1728 svchcst.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\240612703.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language look2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchcst.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1384 f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe 1384 f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1384 f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe 1384 f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2640 1384 f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe 83 PID 1384 wrote to memory of 2640 1384 f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe 83 PID 1384 wrote to memory of 2640 1384 f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe 83 PID 1384 wrote to memory of 2060 1384 f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe 86 PID 1384 wrote to memory of 2060 1384 f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe 86 PID 1680 wrote to memory of 1728 1680 svchost.exe 88 PID 1680 wrote to memory of 1728 1680 svchost.exe 88 PID 1680 wrote to memory of 1728 1680 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe"C:\Users\Admin\AppData\Local\Temp\f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\HD_f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exeC:\Users\Admin\AppData\Local\Temp\HD_f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe2⤵
- Executes dropped EXE
PID:2060
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵PID:3964
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchcst"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\svchcst.exeC:\Windows\system32\svchcst.exe "c:\windows\system32\240612703.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_f332e2f30070ae793d13b5664acec47dc140270825144e69cfc5859d5cce8d20.exe
Filesize1.3MB
MD529efd64dd3c7fe1e2b022b7ad73a1ba5
SHA1e3b6ea8c46fa831cec6f235a5cf48b38a4ae8d69
SHA25661c0810a23580cf492a6ba4f7654566108331e7a4134c968c2d6a05261b2d8a1
SHA512f00b1ab035aa574c70f6b95b63f676fa75ff8f379f92e85ad5872c358a6bb1ed5417fdd226d421307a48653577ca42aba28103b3b2d7a5c572192d6e5f07e8b3
-
Filesize
337KB
MD5fb66e1e31fa1e6dfb21a50ccd11e0409
SHA16c45a0a115ec896eb14a531a44809b2a22cf8934
SHA2565ea8c5455f0ebe884ed98834e78ead8b6c68814bbb1723370299fa44b88c0faa
SHA51258ee149f70438296a67d5ae5cbd6cb9f5b2510a0381466b8f09eec3835be1ce7cad6903ca8fbc9273105132e85952208e78c59f776416c5449b86cc62111154b
-
Filesize
51KB
MD5acbfcb951af16fe42ecf3def6eda63b3
SHA1cb53b04c0d6fbcb36dc828f15669fb2d70ac3c5e
SHA256b32c034de8eda2e93bc11336d2d7db3c5b6204f447d09c192e1f5c227d2072fb
SHA5120c11b2cda752d32b3831466f7568da9f231c6a1196d3b1fd0c4bacec83ba0b19b9b706b1867435c8a0afea1fa23257ae7f70cbca7720daada28882d6c3d1d089
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641