Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:49
Behavioral task
behavioral1
Sample
e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe
Resource
win10v2004-20221111-en
General
-
Target
e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe
-
Size
132KB
-
MD5
c2aa0dbf079052d3fcb4ae0bf284a50b
-
SHA1
3ca7559c910ff4e1fc7bc19d43173bab24c98bf0
-
SHA256
e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03
-
SHA512
c23aa7e429ab3d90815f4f7ae5ac6e9fa087ba2779ce40c1ceefb470285642e063aa1b4663e68f9175a5f13dfc169511564c158bec45e769f4c4c68a4d74a0b1
-
SSDEEP
3072:zTgDaJ/AiU6bGP5PBBkOdL07rRg2ABSEsEQ37XWys:XgDaJ/7CPNiNAg2eXWys
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
Processes:
resource yara_rule \PROGRA~1\Common Files\Sogou.exe family_gh0strat \PROGRA~1\Common Files\Sogou.exe family_gh0strat C:\PROGRA~1\Common Files\Sogou.exe family_gh0strat C:\progra~1\Common Files\Sogou.exe family_gh0strat C:\Windows\SysWOW64\Sougou.exe family_gh0strat C:\Windows\SysWOW64\Sougou.exe family_gh0strat \PROGRA~1\Common Files\Sogou.exe family_gh0strat C:\PROGRA~1\Common Files\Sogou.exe family_gh0strat \PROGRA~1\Common Files\Sogou.exe family_gh0strat -
Executes dropped EXE 3 IoCs
Processes:
Sogou.exeSougou.exeSogou.exepid process 1536 Sogou.exe 1064 Sougou.exe 2040 Sogou.exe -
Loads dropped DLL 4 IoCs
Processes:
e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exeSougou.exepid process 768 e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe 768 e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe 1064 Sougou.exe 1064 Sougou.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exeSougou.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiaoyu = "C:\\progra~1\\Common Files\\Sogou.exe" e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Sougou.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiaoyu = "C:\\progra~1\\Common Files\\Sogou.exe" Sougou.exe -
Drops file in System32 directory 1 IoCs
Processes:
Sogou.exedescription ioc process File created C:\Windows\SysWOW64\Sougou.exe Sogou.exe -
Drops file in Program Files directory 3 IoCs
Processes:
Sougou.exee6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exedescription ioc process File created C:\progra~1\Common Files\Sogou.exe Sougou.exe File created C:\progra~1\Common Files\Sogou.exe e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe File opened for modification C:\progra~1\Common Files\Sogou.exe e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exeSougou.exedescription pid process target process PID 768 wrote to memory of 1536 768 e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe Sogou.exe PID 768 wrote to memory of 1536 768 e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe Sogou.exe PID 768 wrote to memory of 1536 768 e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe Sogou.exe PID 768 wrote to memory of 1536 768 e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe Sogou.exe PID 1064 wrote to memory of 2040 1064 Sougou.exe Sogou.exe PID 1064 wrote to memory of 2040 1064 Sougou.exe Sogou.exe PID 1064 wrote to memory of 2040 1064 Sougou.exe Sogou.exe PID 1064 wrote to memory of 2040 1064 Sougou.exe Sogou.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe"C:\Users\Admin\AppData\Local\Temp\e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:768 -
C:\progra~1\Common Files\Sogou.exe"C:\progra~1\Common Files\Sogou.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1536
-
-
C:\Windows\SysWOW64\Sougou.exeC:\Windows\SysWOW64\Sougou.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\progra~1\Common Files\Sogou.exe"C:\progra~1\Common Files\Sogou.exe"2⤵
- Executes dropped EXE
PID:2040
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5c2aa0dbf079052d3fcb4ae0bf284a50b
SHA13ca7559c910ff4e1fc7bc19d43173bab24c98bf0
SHA256e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03
SHA512c23aa7e429ab3d90815f4f7ae5ac6e9fa087ba2779ce40c1ceefb470285642e063aa1b4663e68f9175a5f13dfc169511564c158bec45e769f4c4c68a4d74a0b1
-
Filesize
132KB
MD5c2aa0dbf079052d3fcb4ae0bf284a50b
SHA13ca7559c910ff4e1fc7bc19d43173bab24c98bf0
SHA256e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03
SHA512c23aa7e429ab3d90815f4f7ae5ac6e9fa087ba2779ce40c1ceefb470285642e063aa1b4663e68f9175a5f13dfc169511564c158bec45e769f4c4c68a4d74a0b1
-
Filesize
27.1MB
MD5da6d29baf5b75e8dd8375f88651b141c
SHA16dfccf1105c096cf0c096e08c1480461fc5ea620
SHA2563276d98f4474fdd1d4869573ec7b976deb0503421f03a5b3c55e24799f97c4e4
SHA51208f54e7801e44239ac5f0e52471f47a773ec703611e54354fe70b0e52dd2ca2398098f62306d1967501a824682bbfb1c4bac8b2b48375624737ba90072bbaf10
-
Filesize
27.1MB
MD5da6d29baf5b75e8dd8375f88651b141c
SHA16dfccf1105c096cf0c096e08c1480461fc5ea620
SHA2563276d98f4474fdd1d4869573ec7b976deb0503421f03a5b3c55e24799f97c4e4
SHA51208f54e7801e44239ac5f0e52471f47a773ec703611e54354fe70b0e52dd2ca2398098f62306d1967501a824682bbfb1c4bac8b2b48375624737ba90072bbaf10
-
Filesize
132KB
MD5c2aa0dbf079052d3fcb4ae0bf284a50b
SHA13ca7559c910ff4e1fc7bc19d43173bab24c98bf0
SHA256e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03
SHA512c23aa7e429ab3d90815f4f7ae5ac6e9fa087ba2779ce40c1ceefb470285642e063aa1b4663e68f9175a5f13dfc169511564c158bec45e769f4c4c68a4d74a0b1
-
Filesize
132KB
MD5c2aa0dbf079052d3fcb4ae0bf284a50b
SHA13ca7559c910ff4e1fc7bc19d43173bab24c98bf0
SHA256e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03
SHA512c23aa7e429ab3d90815f4f7ae5ac6e9fa087ba2779ce40c1ceefb470285642e063aa1b4663e68f9175a5f13dfc169511564c158bec45e769f4c4c68a4d74a0b1
-
Filesize
132KB
MD5c2aa0dbf079052d3fcb4ae0bf284a50b
SHA13ca7559c910ff4e1fc7bc19d43173bab24c98bf0
SHA256e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03
SHA512c23aa7e429ab3d90815f4f7ae5ac6e9fa087ba2779ce40c1ceefb470285642e063aa1b4663e68f9175a5f13dfc169511564c158bec45e769f4c4c68a4d74a0b1
-
Filesize
132KB
MD5c2aa0dbf079052d3fcb4ae0bf284a50b
SHA13ca7559c910ff4e1fc7bc19d43173bab24c98bf0
SHA256e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03
SHA512c23aa7e429ab3d90815f4f7ae5ac6e9fa087ba2779ce40c1ceefb470285642e063aa1b4663e68f9175a5f13dfc169511564c158bec45e769f4c4c68a4d74a0b1
-
Filesize
132KB
MD5c2aa0dbf079052d3fcb4ae0bf284a50b
SHA13ca7559c910ff4e1fc7bc19d43173bab24c98bf0
SHA256e6dd59153035a706919ad0f77708ec198153a5ec6266ba5c583133a9f6a20e03
SHA512c23aa7e429ab3d90815f4f7ae5ac6e9fa087ba2779ce40c1ceefb470285642e063aa1b4663e68f9175a5f13dfc169511564c158bec45e769f4c4c68a4d74a0b1