Analysis
-
max time kernel
159s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
941f075dd53a31ea3cc99de8542ca75df3ea7df334066fcbf8eaf80294b6a42c.exe
Resource
win7-20220901-en
0 signatures
150 seconds
General
-
Target
941f075dd53a31ea3cc99de8542ca75df3ea7df334066fcbf8eaf80294b6a42c.exe
-
Size
162KB
-
MD5
2ae361acb1546401026453f4f3a2853d
-
SHA1
7a127715845f0b5fd8979bd36710cb27162c58b6
-
SHA256
941f075dd53a31ea3cc99de8542ca75df3ea7df334066fcbf8eaf80294b6a42c
-
SHA512
de779560d5b0e02f0cd89a0c3e0d4ff60e05a3b2e78c7a15b7bc704d3ad72e29f51a8202f0554eea289cb7578d7adfa80c14da142f1cf8519a99a6b6e364b919
-
SSDEEP
3072:SQhZkOLfuDg0PtOqzKONqsEykRLSDGoFnlMMfRn4icUolBu2K2rtNtJAN:oOFStZzKqqsE6pFtFcZgr2rF+
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/1380-134-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/1380-135-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/1380-136-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat -
resource yara_rule behavioral2/memory/1380-132-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/1380-134-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/1380-135-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/1380-136-0x0000000010000000-0x000000001003B000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4736 1380 WerFault.exe 78 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1380 941f075dd53a31ea3cc99de8542ca75df3ea7df334066fcbf8eaf80294b6a42c.exe 1380 941f075dd53a31ea3cc99de8542ca75df3ea7df334066fcbf8eaf80294b6a42c.exe 1380 941f075dd53a31ea3cc99de8542ca75df3ea7df334066fcbf8eaf80294b6a42c.exe 1380 941f075dd53a31ea3cc99de8542ca75df3ea7df334066fcbf8eaf80294b6a42c.exe 1380 941f075dd53a31ea3cc99de8542ca75df3ea7df334066fcbf8eaf80294b6a42c.exe 1380 941f075dd53a31ea3cc99de8542ca75df3ea7df334066fcbf8eaf80294b6a42c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\941f075dd53a31ea3cc99de8542ca75df3ea7df334066fcbf8eaf80294b6a42c.exe"C:\Users\Admin\AppData\Local\Temp\941f075dd53a31ea3cc99de8542ca75df3ea7df334066fcbf8eaf80294b6a42c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 6082⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1380 -ip 13801⤵PID:4288