Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe
Resource
win10v2004-20221111-en
General
-
Target
b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe
-
Size
3.4MB
-
MD5
93eddd7fef39b6cd5b3b77a10d48c094
-
SHA1
ac44b5f97671c2fc20f4796f509cbc71e1c902c6
-
SHA256
b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142
-
SHA512
de3a66174c3ce284c65d1b79edb06edae08999853abc204feab4f679e14a014d0dd2af07dd031d0acc54acfb9191e896844242ab261c85c2f7fcfa83ca62066a
-
SSDEEP
98304:0roXfzhKDmC+7pMkBp9o6oD0LWEtjG8ZvYUs:nXfzhKDmC+7++pCz0L1vvBs
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/760-70-0x0000000010000000-0x000000001007B000-memory.dmp family_gh0strat behavioral1/memory/760-74-0x0000000002030000-0x00000000020C6000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 760 microsoft.net.native.framework.1.7_1.7.27413.0_x64.exe -
Loads dropped DLL 5 IoCs
pid Process 1444 b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe 760 microsoft.net.native.framework.1.7_1.7.27413.0_x64.exe 760 microsoft.net.native.framework.1.7_1.7.27413.0_x64.exe 760 microsoft.net.native.framework.1.7_1.7.27413.0_x64.exe 760 microsoft.net.native.framework.1.7_1.7.27413.0_x64.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1444 b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1444 b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 760 1444 b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe 27 PID 1444 wrote to memory of 760 1444 b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe 27 PID 1444 wrote to memory of 760 1444 b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe 27 PID 1444 wrote to memory of 760 1444 b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe"C:\Users\Admin\AppData\Local\Temp\b1abb4bdb431ca7b588039933166cbebd387952ddf6e35493d6a3b355188b142.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Public\Assets\microsoft.net.native.framework.1.7_1.7.27413.0_x64.exe"C:\Users\Public\Assets\microsoft.net.native.framework.1.7_1.7.27413.0_x64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:760
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5acb860f6e3a5c83931e7ba395f65552a
SHA148260d99363d759133d8bfd88687fbb504a70378
SHA256d1bbeb6f761ee1f1387ae20866102cd095790b58968cd656d3c7260b957e282b
SHA5125fc9e54d47c07d1f3612a2acd7095fe0469394deb8f08b54830db2219103a9379b206caa26072880dadbc2e549cd8b195380c457c09f803cec6a04a59a741372
-
Filesize
410KB
MD54fb450c8ca339e79ecbaead391418126
SHA1892a8bdd074eca0ca02a485bc544f24a80c1338c
SHA2560d819f6887630728f6a82c26d08f6191a093b0ce20115b9080003aa4a7093b05
SHA512c6fc8bc8df2578470210f818d9dc0afb14e8096d8de7af09b08c3b2c71888c6f93195f122bf6cffa677d31d1d0e3baa64855af79fd326517d2d69a02b171d51d
-
Filesize
755KB
MD5a16774e8834fc402639203b75baefe1a
SHA1f8ca806d3004678d8e859036826f1b9ad2966c67
SHA256941117cd1e6245f6e3ec732e2db91a4d28fea42b56f8970b0fa7c007cf41df10
SHA512fa6f6abd0615bf047643ac81766023f5a67f06f5ddb4f6fd5c029108b513ccd819af7ea6acd7dde6cc030c8ab6f3fb3c2d70274f84acb68ecc539d4c5713fe76
-
Filesize
277KB
MD565b467f06876560a98aad7e9fa3e9404
SHA143fe5a983c0b37961ce076203a76b3db1aa4ebea
SHA256fecd650431c8b2c9a65e58e21b023fca0e8de668cdda762c8500730a0d6cbe75
SHA512d2e41bb5e8e4579dace396561b0f82cb4aaca54cc31da5db25ba85968f75bdb274279ed3abf16fa2ba98887a4e5cb6d7d4b4ffa0e71c0ece91c1d452f25863c3
-
Filesize
576KB
MD56c9a13fbf3b56760e5e04d58f6cd5f17
SHA1cd4275821defd63c3a2f7b6c1f9c08648769a266
SHA256d406ad436b18641205d0c92ed54afde085459f8c57b94e0265ab5f20752e1cae
SHA512ef8b797510d96ed983ddd8f1337ca85e5dfcc1913fd9471116d65edf7cc9138c5cb2df3c1bdb956f7ddf5f4abe4309e1a2e4580d1e0f25e4a540f15644e4ebcd
-
Filesize
121KB
MD5940bb8ab8affaab9a7b7cecd4c8f7c7b
SHA1344961750f0d6d59a373ea454d2cad806f6b65e6
SHA256bf8b33b52a0c101ad667a98c071772ad0521305d8b9c47475bfb6c2a17e412c3
SHA512b52ebdf571a7a691c1ef0fbbab88cfb61d538276ffc787e8221c1ef8d7b9e08963d5b227b39033490c507c101b8749d115587d6a13198b6e8562946784eac4a5
-
Filesize
136B
MD518b87fa1185615eb0efdcb088f01bc67
SHA17ebbae2fef9ee63557cd40f2d7795bb41cae048d
SHA256972ab74ea35bf26f71bed515be517f4cb38d67d264669fa082f3d326bc0a95cc
SHA5124e24d4e8d4330cfc244ce85ec2311a566427f413ab2efbae2f9ce157a6add4c5f871944571aa019501c923190653e1cf8a6a8981c147a11f7f177e93c82afc17
-
Filesize
72KB
MD5acb860f6e3a5c83931e7ba395f65552a
SHA148260d99363d759133d8bfd88687fbb504a70378
SHA256d1bbeb6f761ee1f1387ae20866102cd095790b58968cd656d3c7260b957e282b
SHA5125fc9e54d47c07d1f3612a2acd7095fe0469394deb8f08b54830db2219103a9379b206caa26072880dadbc2e549cd8b195380c457c09f803cec6a04a59a741372
-
Filesize
277KB
MD565b467f06876560a98aad7e9fa3e9404
SHA143fe5a983c0b37961ce076203a76b3db1aa4ebea
SHA256fecd650431c8b2c9a65e58e21b023fca0e8de668cdda762c8500730a0d6cbe75
SHA512d2e41bb5e8e4579dace396561b0f82cb4aaca54cc31da5db25ba85968f75bdb274279ed3abf16fa2ba98887a4e5cb6d7d4b4ffa0e71c0ece91c1d452f25863c3
-
Filesize
121KB
MD5940bb8ab8affaab9a7b7cecd4c8f7c7b
SHA1344961750f0d6d59a373ea454d2cad806f6b65e6
SHA256bf8b33b52a0c101ad667a98c071772ad0521305d8b9c47475bfb6c2a17e412c3
SHA512b52ebdf571a7a691c1ef0fbbab88cfb61d538276ffc787e8221c1ef8d7b9e08963d5b227b39033490c507c101b8749d115587d6a13198b6e8562946784eac4a5
-
Filesize
410KB
MD54fb450c8ca339e79ecbaead391418126
SHA1892a8bdd074eca0ca02a485bc544f24a80c1338c
SHA2560d819f6887630728f6a82c26d08f6191a093b0ce20115b9080003aa4a7093b05
SHA512c6fc8bc8df2578470210f818d9dc0afb14e8096d8de7af09b08c3b2c71888c6f93195f122bf6cffa677d31d1d0e3baa64855af79fd326517d2d69a02b171d51d
-
Filesize
755KB
MD5a16774e8834fc402639203b75baefe1a
SHA1f8ca806d3004678d8e859036826f1b9ad2966c67
SHA256941117cd1e6245f6e3ec732e2db91a4d28fea42b56f8970b0fa7c007cf41df10
SHA512fa6f6abd0615bf047643ac81766023f5a67f06f5ddb4f6fd5c029108b513ccd819af7ea6acd7dde6cc030c8ab6f3fb3c2d70274f84acb68ecc539d4c5713fe76