Analysis
-
max time kernel
205s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 08:21
Behavioral task
behavioral1
Sample
b499fe0eb4136cf1878d283013fb1af0d141f77af5c03b8fa116a1177b6196a3.exe
Resource
win7-20221111-en
3 signatures
150 seconds
General
-
Target
b499fe0eb4136cf1878d283013fb1af0d141f77af5c03b8fa116a1177b6196a3.exe
-
Size
606KB
-
MD5
e84598bf649ce1b39477136d2387e9c4
-
SHA1
f774046b6b432b3df74a796ecbbd5b7dd9019767
-
SHA256
b499fe0eb4136cf1878d283013fb1af0d141f77af5c03b8fa116a1177b6196a3
-
SHA512
eb7d3b2752d10ff7699fc6b6da2c4c3ae2d3835ac1d940eafe6de39f8016318fec754383e0676a8513b11bd8992d40c21cfe9ef27d64d54f42d08928bdb7a8a8
-
SSDEEP
12288:3cjrLQhTeGDF1r+TStBXvWyZ4uVNedGlHqM5VLFPMd:3cjeTeGDF1r+TStBXhZPVNXJqM5VJkd
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1316-55-0x0000000000400000-0x000000000050F000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b499fe0eb4136cf1878d283013fb1af0d141f77af5c03b8fa116a1177b6196a3.exe" b499fe0eb4136cf1878d283013fb1af0d141f77af5c03b8fa116a1177b6196a3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run b499fe0eb4136cf1878d283013fb1af0d141f77af5c03b8fa116a1177b6196a3.exe