Analysis
-
max time kernel
47s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe
Resource
win10v2004-20220812-en
General
-
Target
bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe
-
Size
236KB
-
MD5
20eb39943fe886171b9b0dc70fcdddb6
-
SHA1
41f9b2cac1ebc90a4da84e9d09f39e888f6c4f0d
-
SHA256
bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388
-
SHA512
14547f8dc159aff1bcbd9c9bcadbafefbc45595bf73f49ece5c7d8aef1e7b3b526b77d3775d13248827a34e85b1c1069a200476adab70235c772400f091deabd
-
SSDEEP
3072:j+HDVTtkdiAojheSc5ch491vxqHMkumn0lBE4vvaPc5nm7gynXVpXrlt6umIgqV1:6HR8iAoNbc5+4z4z45nGgyXV/tlmXm
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1932-57-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/1932-60-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXA6A53668 = "C:\\Windows\\XXXXXXA6A53668\\svchsot.exe" bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\A6A53668 bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe File opened for modification C:\Windows\SysWOW64\A6A53668 bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\XXXXXXA6A53668\svchsot.exe bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe File opened for modification C:\Windows\XXXXXXA6A53668\svchsot.exe bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1932 bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe 1932 bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe 1932 bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe"C:\Users\Admin\AppData\Local\Temp\bade9cc971c1019871fe1a9a14c86769eff6966498125abc88fe3b2d8800d388.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1932