Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 08:24
Static task
static1
Behavioral task
behavioral1
Sample
setups.exe
Resource
win7-20240903-en
General
-
Target
setups.exe
-
Size
22.6MB
-
MD5
d6437b34d2f4ebc283dba35fa11fec25
-
SHA1
cf4ede6cff02f7d43362e1a7c87657fa6099842d
-
SHA256
1a849f51b091f22e8949ca92f5e99482bd3d9202c76fa27afd209f0e21b46bcc
-
SHA512
02524b129c33b1e2c378fc46d9f1bf98f5422c1b4bac6fae9bbce46cba9a762970dc93a643c41aaefcafe43734fdba3ba8e78227dd559b3c3f135085f31e4cff
-
SSDEEP
6144:lUrJnWqbUNZFXXp1pvpGFd7XDda328nnnnnnR:qlWqYvMFJUma
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x00070000000186ea-12.dat family_gh0strat behavioral1/memory/2820-15-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/2820-17-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2140 gulmrdlqfw -
Executes dropped EXE 1 IoCs
pid Process 2140 gulmrdlqfw -
Loads dropped DLL 3 IoCs
pid Process 2420 setups.exe 2420 setups.exe 2820 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\crsvekfwyy svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\WinRAR\Formats\Date\I%SESSIONNAME%\jeypj.cc3 gulmrdlqfw -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setups.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gulmrdlqfw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2140 gulmrdlqfw 2820 svchost.exe 2820 svchost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeRestorePrivilege 2140 gulmrdlqfw Token: SeBackupPrivilege 2140 gulmrdlqfw Token: SeBackupPrivilege 2140 gulmrdlqfw Token: SeRestorePrivilege 2140 gulmrdlqfw Token: SeBackupPrivilege 2820 svchost.exe Token: SeRestorePrivilege 2820 svchost.exe Token: SeBackupPrivilege 2820 svchost.exe Token: SeBackupPrivilege 2820 svchost.exe Token: SeSecurityPrivilege 2820 svchost.exe Token: SeSecurityPrivilege 2820 svchost.exe Token: SeBackupPrivilege 2820 svchost.exe Token: SeBackupPrivilege 2820 svchost.exe Token: SeSecurityPrivilege 2820 svchost.exe Token: SeBackupPrivilege 2820 svchost.exe Token: SeBackupPrivilege 2820 svchost.exe Token: SeSecurityPrivilege 2820 svchost.exe Token: SeBackupPrivilege 2820 svchost.exe Token: SeRestorePrivilege 2820 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2140 2420 setups.exe 30 PID 2420 wrote to memory of 2140 2420 setups.exe 30 PID 2420 wrote to memory of 2140 2420 setups.exe 30 PID 2420 wrote to memory of 2140 2420 setups.exe 30 PID 2420 wrote to memory of 2140 2420 setups.exe 30 PID 2420 wrote to memory of 2140 2420 setups.exe 30 PID 2420 wrote to memory of 2140 2420 setups.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\setups.exe"C:\Users\Admin\AppData\Local\Temp\setups.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\users\admin\appdata\local\gulmrdlqfw"C:\Users\Admin\AppData\Local\Temp\setups.exe" a -sc:\users\admin\appdata\local\temp\setups.exe2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19.1MB
MD59f00c413fcf7bb4d7ec7b3f048a298f3
SHA1b50ed298ae280d2db69cf27000002f26fca9c30d
SHA25605430e137b1158d4e3f1279df1921db336b29edbecc5e57b98871f2fa01422f7
SHA51216a9255c8510961c8c3c918b3c34e17baa61df52c5312c045c319be68b71d9230edc89eba7ee730139e73a64da0a664d9f3cdcac767103b1039d421f8a877a67
-
Filesize
22.6MB
MD587a84116b8b9349d29464ea731bfeb95
SHA17fed7971e4e9d71af5d5563e80c21a8198501b02
SHA25660ae47dfce97701d6a962b667afeadf6501dc5bb970026a8f628cc5ddfc57030
SHA512b0ee12fd72afb8da87f11e36badef40f3c3d83b9c91e826139ddc5a02285c8068721faecf5ec8668870aa36fc14e1c2d8c7c39530629d242d33cb634d0d9a951