Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 14:27

General

  • Target

    8f01addadd37cfd6cf43c5c8f1d0571458aa46f07b94ae782fe65e9d26bbf9d0.exe

  • Size

    433KB

  • MD5

    102ac11eecaeb86f2c5ec7659b405260

  • SHA1

    9645b14cb0331ee8b365d3aa89267ee9fe8648d5

  • SHA256

    8f01addadd37cfd6cf43c5c8f1d0571458aa46f07b94ae782fe65e9d26bbf9d0

  • SHA512

    407b0b77ac0729f5de50c8481bdf654ad6dd796c66a9528b4fa46ee3a3a588bc8e52473a951e44ea312f372f5ca188bbe8832d54d97ae351c079b38ec8381911

  • SSDEEP

    6144:7evzV8Yct6Ym5OjI6UOwqdC32bAAzMFqonJl3/L:7e7V8rzmb6URlizUqc

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f01addadd37cfd6cf43c5c8f1d0571458aa46f07b94ae782fe65e9d26bbf9d0.exe
    "C:\Users\Admin\AppData\Local\Temp\8f01addadd37cfd6cf43c5c8f1d0571458aa46f07b94ae782fe65e9d26bbf9d0.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1448
    • \??\c:\Windows\svchest000.exe
      c:\Windows\svchest000.exe
      2⤵
      • Executes dropped EXE
      PID:620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchest000.exe

    Filesize

    433KB

    MD5

    102ac11eecaeb86f2c5ec7659b405260

    SHA1

    9645b14cb0331ee8b365d3aa89267ee9fe8648d5

    SHA256

    8f01addadd37cfd6cf43c5c8f1d0571458aa46f07b94ae782fe65e9d26bbf9d0

    SHA512

    407b0b77ac0729f5de50c8481bdf654ad6dd796c66a9528b4fa46ee3a3a588bc8e52473a951e44ea312f372f5ca188bbe8832d54d97ae351c079b38ec8381911

  • memory/620-55-0x0000000000000000-mapping.dmp

  • memory/620-58-0x0000000000400000-0x00000000004F5000-memory.dmp

    Filesize

    980KB

  • memory/1448-54-0x00000000758B1000-0x00000000758B3000-memory.dmp

    Filesize

    8KB

  • memory/1448-59-0x00000000025B0000-0x00000000026A5000-memory.dmp

    Filesize

    980KB

  • memory/1448-60-0x00000000025B0000-0x00000000026A5000-memory.dmp

    Filesize

    980KB