Analysis

  • max time kernel
    173s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 14:04

General

  • Target

    62521d93489fc2cd30f867d60b69f1fe621cf4cd22679c61221e6fe58992848b.exe

  • Size

    384KB

  • MD5

    a8355fb3686e23bfaa33d2a300f997e8

  • SHA1

    8291c5621725768351e4e10bba97b852901aaef0

  • SHA256

    62521d93489fc2cd30f867d60b69f1fe621cf4cd22679c61221e6fe58992848b

  • SHA512

    7c7f8fad9d6540d149cb58d41be76c459e62c60da7c4660a221ab1496b1f4687493b736f13d58ab5008f0cfec042c39e3dd5fe2e997421f4091be228c5e776c0

  • SSDEEP

    6144:QGzRxSVtp0l6whGfsKR+zkBpTaa5tJH7/:jt0VPFfsKAkrbPl7/

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62521d93489fc2cd30f867d60b69f1fe621cf4cd22679c61221e6fe58992848b.exe
    "C:\Users\Admin\AppData\Local\Temp\62521d93489fc2cd30f867d60b69f1fe621cf4cd22679c61221e6fe58992848b.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:908
    • \??\c:\Windows\(null)0.exe
      c:\Windows\(null)0.exe
      2⤵
      • Executes dropped EXE
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\(null)0.exe

    Filesize

    384KB

    MD5

    6e3268f6be4621fed0cc4303110f8f50

    SHA1

    a061a21be1ac05609df9f4db3204ad9c688d8a07

    SHA256

    7a647e863ae8943a556395491fe4d7e4215f2a7109b2882b9451b7655d80e9e6

    SHA512

    75d2ab5f4bfc8f9665639701d123ac436a760d2bf3d80ff18dec3188276953e880fc40ebe5b31162c01b57ba8330a2c815ba4216397c1adde45ad78ac9b289c6

  • memory/908-54-0x0000000075131000-0x0000000075133000-memory.dmp

    Filesize

    8KB

  • memory/908-59-0x0000000002730000-0x0000000002821000-memory.dmp

    Filesize

    964KB

  • memory/2036-58-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB