Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe
Resource
win10v2004-20250217-en
General
-
Target
6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe
-
Size
488KB
-
MD5
08914d7ffb54610b54d8581efe9d9308
-
SHA1
9ede90413b76ff5f1963d1430158b7c11b099ab4
-
SHA256
6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f
-
SHA512
e9dc5f9d432730099ecf185e9f2b552cda22f5eadb8db3a0d3a9ba411d0c8482cdab208d9e40e1a2c36e4edb3bfedfa38b757c7fe0c75bbd9b47046e2475e997
-
SSDEEP
6144:s8xBmtd8k+c1Iu7mwVKMU1npAkzDUnB/pfeYN/51Ap4txQf5P+3Y1tMmbWsTaad:7xy6kthKX1pAfBVV1Ap4y+3Y12wWjad
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3236-3-0x0000000010000000-0x0000000010010000-memory.dmp family_gh0strat behavioral2/memory/1928-14-0x0000000010000000-0x0000000010010000-memory.dmp family_gh0strat -
Gh0strat family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Onzvei.exe -
Executes dropped EXE 2 IoCs
pid Process 1928 Onzvei.exe 2548 Onzvei.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\Onzvei.exe 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe File opened for modification C:\windows\Onzvei.exe 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 228 3236 WerFault.exe 85 3260 1928 WerFault.exe 89 1396 3236 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onzvei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Onzvei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3236 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe Token: 33 2548 Onzvei.exe Token: SeIncBasePriorityPrivilege 2548 Onzvei.exe Token: 33 2548 Onzvei.exe Token: SeIncBasePriorityPrivilege 2548 Onzvei.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3236 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 3236 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 3236 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 3236 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 1928 Onzvei.exe 1928 Onzvei.exe 1928 Onzvei.exe 1928 Onzvei.exe 2548 Onzvei.exe 2548 Onzvei.exe 2548 Onzvei.exe 2548 Onzvei.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3236 wrote to memory of 2900 3236 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 90 PID 3236 wrote to memory of 2900 3236 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 90 PID 3236 wrote to memory of 2900 3236 6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe 90 PID 1928 wrote to memory of 2548 1928 Onzvei.exe 92 PID 1928 wrote to memory of 2548 1928 Onzvei.exe 92 PID 1928 wrote to memory of 2548 1928 Onzvei.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe"C:\Users\Admin\AppData\Local\Temp\6436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\643636~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 2402⤵
- Program crash
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 2402⤵
- Program crash
PID:1396
-
-
C:\windows\Onzvei.exeC:\windows\Onzvei.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\windows\Onzvei.exeC:\windows\Onzvei.exe -acsi2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 2562⤵
- Program crash
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1928 -ip 19281⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3236 -ip 32361⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3236 -ip 32361⤵PID:64
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD508914d7ffb54610b54d8581efe9d9308
SHA19ede90413b76ff5f1963d1430158b7c11b099ab4
SHA2566436365efa1ab36dc47beace319b459cbcab79f7e240b7ec28f231d4f7511e1f
SHA512e9dc5f9d432730099ecf185e9f2b552cda22f5eadb8db3a0d3a9ba411d0c8482cdab208d9e40e1a2c36e4edb3bfedfa38b757c7fe0c75bbd9b47046e2475e997
-
Filesize
5B
MD56dc4a31db60d3da6b1d477315619952e
SHA1e881b0ec41bcc1ed53643c01c0a36bae66575477
SHA256d5a5b182cd30db1d5d8c611de8d1764a8929186986b69eed8ae6760ebc48c0f6
SHA5123b64e73503f964b932781732f81680ef51e2df64ebd171be58c40cdbbd36ec7d38c79863feba1fdc769d15de150af95840061f82cf626aa01556396d0712637d