Analysis
-
max time kernel
104s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2025, 13:43
Behavioral task
behavioral1
Sample
f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe
Resource
win10v2004-20250314-en
General
-
Target
f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe
-
Size
157KB
-
MD5
ff9409140eade15c0688e4e3c9979491
-
SHA1
92d7b0d4f4dd327b5b09f3acde222788c97aabcf
-
SHA256
f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f
-
SHA512
506f975e44912a764f218feb4ffc0ab8b3c3ff71dca386b58308851130399779e5bc3548404df77fe264952b582f3cfb11c075ace40c66d6c40622dd028571d6
-
SSDEEP
3072:LMx5+9Tj144UtgIY/IGFmVt4+eGpIeFOOtPbnKh0iJhakVZkS8q4MFJD703q:A8J144K96Ih4+ppIetPbKNhakVZWMFNn
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/3528-16-0x0000000000400000-0x000000000046C000-memory.dmp family_gh0strat behavioral1/memory/1816-18-0x0000000000400000-0x000000000046C000-memory.dmp family_gh0strat behavioral1/memory/2896-22-0x0000000000400000-0x000000000046C000-memory.dmp family_gh0strat behavioral1/memory/532-24-0x0000000000400000-0x000000000046C000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 3 IoCs
pid Process 532 svchost.exe 1816 Update.exe 3528 svchost.exe -
resource yara_rule behavioral1/memory/2896-0-0x0000000000400000-0x000000000046C000-memory.dmp vmprotect behavioral1/files/0x0008000000024265-4.dat vmprotect behavioral1/memory/3528-16-0x0000000000400000-0x000000000046C000-memory.dmp vmprotect behavioral1/memory/1816-18-0x0000000000400000-0x000000000046C000-memory.dmp vmprotect behavioral1/memory/2896-22-0x0000000000400000-0x000000000046C000-memory.dmp vmprotect behavioral1/memory/532-24-0x0000000000400000-0x000000000046C000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\duowan = "C:\\WINDOWS\\Update.exe" svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\afc9fe2f418b00a0.bat Update.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\Update.exe svchost.exe File opened for modification C:\WINDOWS\Update.exe svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2136 532 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2896 f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe 2896 f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe 532 svchost.exe 532 svchost.exe 532 svchost.exe 532 svchost.exe 532 svchost.exe 532 svchost.exe 532 svchost.exe 532 svchost.exe 532 svchost.exe 532 svchost.exe 1816 Update.exe 1816 Update.exe 3528 svchost.exe 3528 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 532 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 532 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2896 wrote to memory of 532 2896 f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe 86 PID 2896 wrote to memory of 532 2896 f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe 86 PID 2896 wrote to memory of 532 2896 f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe 86 PID 3068 wrote to memory of 1816 3068 cmd.exe 89 PID 3068 wrote to memory of 1816 3068 cmd.exe 89 PID 3068 wrote to memory of 1816 3068 cmd.exe 89 PID 1816 wrote to memory of 3528 1816 Update.exe 91 PID 1816 wrote to memory of 3528 1816 Update.exe 91 PID 1816 wrote to memory of 3528 1816 Update.exe 91 PID 1816 wrote to memory of 5684 1816 Update.exe 93 PID 1816 wrote to memory of 5684 1816 Update.exe 93 PID 1816 wrote to memory of 5684 1816 Update.exe 93 PID 2896 wrote to memory of 3000 2896 f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe 108 PID 2896 wrote to memory of 3000 2896 f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe 108 PID 2896 wrote to memory of 3000 2896 f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe"C:\Users\Admin\AppData\Local\Temp\f8d7d9a72bcab06b302f38c33a563988452dde8c8bfa4d67bbaffc32dd983c7f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\duowan\svchost.exeC:\Users\Admin\AppData\Local\Temp\duowan\svchost.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 5843⤵
- Program crash
PID:2136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat2⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\WINDOWS\Update.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\WINDOWS\Update.exeC:\WINDOWS\Update.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\duowan\svchost.exeC:\Users\Admin\AppData\Local\Temp\duowan\svchost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat3⤵
- System Location Discovery: System Language Discovery
PID:5684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 532 -ip 5321⤵PID:3364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51dd70f86515dd65f1bc9d111afb65861
SHA1cb135181d720c55883acad1ed1569ffb95f1e853
SHA2565662ec8eb46e1126ecc207fbe9ed292e136103053711c36be177d6c4bd073280
SHA5126e87cf2f32e14ddd1b080ca819eafa3cbc2ce62475193b96eda23ec8851c9eda1099bb2600c0cdaaba416fa7659c5780f03bdf1b5625c3fd16c9479ba798b898
-
Filesize
157KB
MD578caf40dc1be94514cfb9493a5eddd67
SHA11f42fb8fe1950d6e05a2d4e3305405dc56576aa7
SHA2568c843b26d42386195e9348bce45f5683fa4bc99a8ff1bb3499fc93f1d48e464a
SHA51285f93c5cf1eddbaafc6b0a22c48a30bc627676d019049cd551dcea9640a0b8d3e09c787de6ae1413ad98201b136d627b6bf75e22874e0449ed7d72bce1d86caa
-
Filesize
2KB
MD595c9765b4e53af1e83556265b0fd9495
SHA12f860e6ff5737a606e23cd3cde6b11565ae54363
SHA2569d6ae9dcde736b9e7d883e7e929b4d04ec200fd243fcfa59010eba26afe63227
SHA5126736df1b045c91e91700dcd882110b60a8a832586ebb3d5906dc0d56f1aa4802d9c9037767ae020bb8be9de9eb8a68ea41338a9a6e68e3d30e5c94724a644ef0