Analysis

  • max time kernel
    158s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2022, 02:40

General

  • Target

    504b1e6f29448d454f825f31fc3c07789fb88577e7617d81f5060a09fcba51e8.exe

  • Size

    192KB

  • MD5

    3ac828eeeba4189c5a38017a287fa1e0

  • SHA1

    cce58f65d2e4e9c162339ca669d08fb953c38a06

  • SHA256

    504b1e6f29448d454f825f31fc3c07789fb88577e7617d81f5060a09fcba51e8

  • SHA512

    5d9637fa405aeb93fe3e2151e9332d6e1ab8012485a2ba1104493fc9d7dc5a5fcab12c0041b95f94431b7cdc0c308d4607c9781adaa4160d243de4f06aff3b41

  • SSDEEP

    3072:/ZYhjFTttfP9ZGFwgvRLLCzOYFDq+UdnIPPlMzcsofIw+KaX0LcHLkMIIRA:hYhhT96wgvRHCzOYtqlGyzcsX3KA0LQ2

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\504b1e6f29448d454f825f31fc3c07789fb88577e7617d81f5060a09fcba51e8.exe
    "C:\Users\Admin\AppData\Local\Temp\504b1e6f29448d454f825f31fc3c07789fb88577e7617d81f5060a09fcba51e8.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2132

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2132-132-0x0000000010000000-0x0000000010121000-memory.dmp

    Filesize

    1.1MB

  • memory/2132-135-0x0000000010000000-0x0000000010121000-memory.dmp

    Filesize

    1.1MB

  • memory/2132-134-0x0000000010000000-0x0000000010121000-memory.dmp

    Filesize

    1.1MB

  • memory/2132-137-0x0000000010000000-0x0000000010121000-memory.dmp

    Filesize

    1.1MB