Analysis

  • max time kernel
    152s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 14:05

General

  • Target

    5f4f11febfe718029588f8f714d42c8550c8284527b877d40b198d2f03ec0588.exe

  • Size

    241KB

  • MD5

    372ebb9f8c8b5ee73527c22de0cd6ff2

  • SHA1

    0c670d0100c1c0a534bf9ecde837d8f154d70757

  • SHA256

    5f4f11febfe718029588f8f714d42c8550c8284527b877d40b198d2f03ec0588

  • SHA512

    c991d56c4122eae2046a8882aca3adabaf871e36d547c176bfb5915ecfdbdf1614cce1926d01d0cc11e7f492db3793e9e16985036f4786fd8241ff8d5a1364ab

  • SSDEEP

    6144:QGzRxSVtp0l6whGfsKR+zkBpTaa5tJHXH:jt0VPFfsKAkrbPlXH

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f4f11febfe718029588f8f714d42c8550c8284527b877d40b198d2f03ec0588.exe
    "C:\Users\Admin\AppData\Local\Temp\5f4f11febfe718029588f8f714d42c8550c8284527b877d40b198d2f03ec0588.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1976
    • \??\c:\Windows\(null)0.exe
      c:\Windows\(null)0.exe
      2⤵
      • Executes dropped EXE
      PID:1956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\(null)0.exe

    Filesize

    241KB

    MD5

    372ebb9f8c8b5ee73527c22de0cd6ff2

    SHA1

    0c670d0100c1c0a534bf9ecde837d8f154d70757

    SHA256

    5f4f11febfe718029588f8f714d42c8550c8284527b877d40b198d2f03ec0588

    SHA512

    c991d56c4122eae2046a8882aca3adabaf871e36d547c176bfb5915ecfdbdf1614cce1926d01d0cc11e7f492db3793e9e16985036f4786fd8241ff8d5a1364ab

  • memory/1976-54-0x0000000074D81000-0x0000000074D83000-memory.dmp

    Filesize

    8KB

  • memory/1976-55-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB

  • memory/1976-59-0x0000000002630000-0x0000000002721000-memory.dmp

    Filesize

    964KB