Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe
Resource
win10v2004-20220812-en
General
-
Target
f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe
-
Size
320KB
-
MD5
5e0d8f216b106a9eb13fb3f2ccccc82b
-
SHA1
d68513a915743574cb7f1477e51a3b12235961cd
-
SHA256
f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae
-
SHA512
3ae8f5fa5b6ebb3ad1be32a2d6c4152b1fc51eed9bbe2e86f90a9799a9c1a58b7d6cac940cf8b29ab5b2ef8da462439be4cb30dfc62d1aff19bb39284bbf9ca0
-
SSDEEP
6144:93MTAq7PqJutuP1FgNV4dN9tSyI3H98gWNlPTGQQm6agrd:93pIPcute6NV44nmNtTird
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/5004-136-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/5004-137-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/5004-139-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXACF01C77 = "C:\\Windows\\XXXXXXACF01C77\\svchsot.exe" f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5004 f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe 5004 f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe 5004 f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe 5004 f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe 5004 f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe 5004 f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5004 f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe"C:\Users\Admin\AppData\Local\Temp\f23efeff6ae4f341e42c44ffd98f0177b3d278b0d97d47d83224c8712bf32dae.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:5004