Analysis
-
max time kernel
202s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 13:39
Behavioral task
behavioral1
Sample
ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe
Resource
win7-20221111-en
General
-
Target
ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe
-
Size
196KB
-
MD5
37eb8554bea35102f6d5c938a8bf081c
-
SHA1
34787f8dcb6aaf5b669545ffa9dfb718962361a9
-
SHA256
ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb
-
SHA512
19e6763545d887466686e0bdfde3cba8284a9ea75adf474713e75d230d382f2fbca7468ad35294a3f48be0c1328adbdc6e00e41c2346aed7457f9905b7139590
-
SSDEEP
6144:6sIt6nW8QoBTyPRqyhYPbHcTBlhHrIndnkv0:39W8YJq8YPbHcT3z
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000b0000000122ef-55.dat family_gh0strat behavioral1/files/0x000b0000000122ef-57.dat family_gh0strat behavioral1/files/0x000b0000000122ef-59.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 328 djkuxifqvt -
Deletes itself 1 IoCs
pid Process 328 djkuxifqvt -
Loads dropped DLL 1 IoCs
pid Process 2000 ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 328 djkuxifqvt -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2000 wrote to memory of 328 2000 ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe 28 PID 2000 wrote to memory of 328 2000 ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe 28 PID 2000 wrote to memory of 328 2000 ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe 28 PID 2000 wrote to memory of 328 2000 ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe 28 PID 2000 wrote to memory of 328 2000 ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe 28 PID 2000 wrote to memory of 328 2000 ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe 28 PID 2000 wrote to memory of 328 2000 ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe"C:\Users\Admin\AppData\Local\Temp\ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
\??\c:\users\admin\appdata\local\djkuxifqvt"C:\Users\Admin\AppData\Local\Temp\ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe" a -sc:\users\admin\appdata\local\temp\ac565d3e4e105e926d7fc3bc59c54dd21acd6624b4884a8e6a67ce35653054cb.exe2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
PID:328
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.2MB
MD51a0f7ad94bf4373667366dc284bd5460
SHA10ec844ac128ea538f2531a1850a5b748c18a9225
SHA256f7671b41c8bf0b344d59cece462233b2a7c79ccb9c066b2b49e13893bc4fff08
SHA512f76ce25984ac71cb70aef2ff00554bd137741614a81293c10abe6a14e6c000a696491739478112ef60d3fd6e76ae01543323946e019c199d8bd2ebaebdf48b8c
-
Filesize
22.2MB
MD51a0f7ad94bf4373667366dc284bd5460
SHA10ec844ac128ea538f2531a1850a5b748c18a9225
SHA256f7671b41c8bf0b344d59cece462233b2a7c79ccb9c066b2b49e13893bc4fff08
SHA512f76ce25984ac71cb70aef2ff00554bd137741614a81293c10abe6a14e6c000a696491739478112ef60d3fd6e76ae01543323946e019c199d8bd2ebaebdf48b8c
-
Filesize
22.2MB
MD51a0f7ad94bf4373667366dc284bd5460
SHA10ec844ac128ea538f2531a1850a5b748c18a9225
SHA256f7671b41c8bf0b344d59cece462233b2a7c79ccb9c066b2b49e13893bc4fff08
SHA512f76ce25984ac71cb70aef2ff00554bd137741614a81293c10abe6a14e6c000a696491739478112ef60d3fd6e76ae01543323946e019c199d8bd2ebaebdf48b8c