Analysis
-
max time kernel
29s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 15:23
Static task
static1
Behavioral task
behavioral1
Sample
92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe
Resource
win10v2004-20220812-en
General
-
Target
92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe
-
Size
192KB
-
MD5
626e6030fa73ac8b9b76fd8e5358a7d0
-
SHA1
4afb882f8ba4a6092f36c5326c08a9794d488d14
-
SHA256
92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b
-
SHA512
002ea2de38447d0a012aee05093bf845c51863683587bf5444790921e6aa6cc567a23d645bf924e1e099e967e6b084d7e522c1854e24ec098b2f726d906cbf88
-
SSDEEP
3072:l8B9tMfP9ZGFwgvRLLCzOYFDq+UdnIPPlMzcsofIw+KaX0LcHLkMIIRb:l6M96wgvRHCzOYtqlGyzcsX3KA0LQIQh
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/548-57-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/548-60-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXA7ABF607 = "C:\\Windows\\XXXXXXA7ABF607\\svchsot.exe" 92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\XXXXXXA7ABF607\svchsot.exe 92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe File opened for modification C:\Windows\XXXXXXA7ABF607\svchsot.exe 92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 548 92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe 548 92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe 548 92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe"C:\Users\Admin\AppData\Local\Temp\92774a874fc079c4d829b14a935f513cf422ea4ae118a795061eedf5ac2a208b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:548