Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 17:37
Static task
static1
Behavioral task
behavioral1
Sample
6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe
Resource
win10v2004-20250217-en
General
-
Target
6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe
-
Size
488KB
-
MD5
08914d7ffb54610b54d8581efe9d9308
-
SHA1
9ede90413b76ff5f1963d1430158b7c11b099ab4
-
SHA256
6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f
-
SHA512
e9dc5f9d432730099ecf185e9f2b552cda22f5eadb8db3a0d3a9ba411d0c8482cdab208d9e40e1a2c36e4edb3bfedfa38b757c7fe0c75bbd9b47046e2475e997
-
SSDEEP
6144:s8xBmtd8k+c1Iu7mwVKMU1npAkzDUnB/pfeYN/51Ap4txQf5P+3Y1tMmbWsTaad:7xy6kthKX1pAfBVV1Ap4y+3Y12wWjad
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2584-3-0x0000000010000000-0x0000000010010000-memory.dmp family_gh0strat behavioral1/memory/2560-22-0x0000000010000000-0x0000000010010000-memory.dmp family_gh0strat -
Gh0strat family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Onzvei.exe -
Deletes itself 1 IoCs
pid Process 2708 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2124 Onzvei.exe 2560 Onzvei.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\Onzvei.exe 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe File opened for modification C:\windows\Onzvei.exe 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onzvei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onzvei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2584 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe Token: 33 2560 Onzvei.exe Token: SeIncBasePriorityPrivilege 2560 Onzvei.exe Token: 33 2560 Onzvei.exe Token: SeIncBasePriorityPrivilege 2560 Onzvei.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2584 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 2584 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 2584 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 2584 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 2124 Onzvei.exe 2124 Onzvei.exe 2124 Onzvei.exe 2124 Onzvei.exe 2560 Onzvei.exe 2560 Onzvei.exe 2560 Onzvei.exe 2560 Onzvei.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2708 2584 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 32 PID 2584 wrote to memory of 2708 2584 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 32 PID 2584 wrote to memory of 2708 2584 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 32 PID 2584 wrote to memory of 2708 2584 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 32 PID 2124 wrote to memory of 2560 2124 Onzvei.exe 33 PID 2124 wrote to memory of 2560 2124 Onzvei.exe 33 PID 2124 wrote to memory of 2560 2124 Onzvei.exe 33 PID 2124 wrote to memory of 2560 2124 Onzvei.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe"C:\Users\Admin\AppData\Local\Temp\6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\643636~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\windows\Onzvei.exeC:\windows\Onzvei.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\windows\Onzvei.exeC:\windows\Onzvei.exe -acsi2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD508914d7ffb54610b54d8581efe9d9308
SHA19ede90413b76ff5f1963d1430158b7c11b099ab4
SHA2566436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f
SHA512e9dc5f9d432730099ecf185e9f2b552cda22f5eadb8db3a0d3a9ba411d0c8482cdab208d9e40e1a2c36e4edb3bfedfa38b757c7fe0c75bbd9b47046e2475e997
-
Filesize
5B
MD56dc4a31db60d3da6b1d477315619952e
SHA1e881b0ec41bcc1ed53643c01c0a36bae66575477
SHA256d5a5b182cd30db1d5d8c611de8d1764a8929186986b69eed8ae6760ebc48c0f6
SHA5123b64e73503f964b932781732f81680ef51e2df64ebd171be58c40cdbbd36ec7d38c79863feba1fdc769d15de150af95840061f82cf626aa01556396d0712637d