Analysis

  • max time kernel
    151s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 06:55

General

  • Target

    aa7d02a2065be4cbb33f3dc4eaa6a2c06a921b009e2c4bbbb1267012fb1f5c31.exe

  • Size

    384KB

  • MD5

    2c81f215c50538f62f0a0438a9aba16d

  • SHA1

    d43f7f43363ea1f81cda14104ac195e8f2bbdc3e

  • SHA256

    aa7d02a2065be4cbb33f3dc4eaa6a2c06a921b009e2c4bbbb1267012fb1f5c31

  • SHA512

    b82a71131cd67b4a18665abda5d5acbb02b4573142de1f3263f0d8c7aa82e52c13e93fe965e1cdcf4b861353256c32e89c8b82643d6daf263ce49fd543a9098e

  • SSDEEP

    12288:KPdK4bgeK8VL5TKjb31wgxllhz7G60i2qvyO4:KPBjK8VlYb3P9Fk

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa7d02a2065be4cbb33f3dc4eaa6a2c06a921b009e2c4bbbb1267012fb1f5c31.exe
    "C:\Users\Admin\AppData\Local\Temp\aa7d02a2065be4cbb33f3dc4eaa6a2c06a921b009e2c4bbbb1267012fb1f5c31.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:748
    • \??\c:\Windows\svchest000.exe
      c:\Windows\svchest000.exe
      2⤵
      • Executes dropped EXE
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchest000.exe

    Filesize

    384KB

    MD5

    7f9a32260e83a2e99578a03c3ce83cd9

    SHA1

    dba4ee56171a4b45dea410d3c3509bfaadbbac3b

    SHA256

    1918aa80bf510aab168f9849fa30f96d861d3e32d55d8c366b354b569bc8cb22

    SHA512

    87ecfad2ecaeb04cd1c7fb4dc8c8bc3936013cf5c0f55786495da019576a71bbd78945daa4e66a4b0907d115f16cba27c792f0c3caf903f44cbffe1bea2b587a

  • memory/748-61-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/748-69-0x00000000028A0000-0x00000000029EE000-memory.dmp

    Filesize

    1.3MB

  • memory/748-58-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/748-57-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/748-59-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/748-60-0x0000000000300000-0x000000000033E000-memory.dmp

    Filesize

    248KB

  • memory/748-56-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/748-54-0x0000000074FB1000-0x0000000074FB3000-memory.dmp

    Filesize

    8KB

  • memory/748-62-0x0000000000380000-0x0000000000383000-memory.dmp

    Filesize

    12KB

  • memory/748-55-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/748-70-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2036-68-0x0000000000210000-0x0000000000213000-memory.dmp

    Filesize

    12KB

  • memory/2036-67-0x00000000002A0000-0x00000000002DE000-memory.dmp

    Filesize

    248KB

  • memory/2036-66-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB