Analysis
-
max time kernel
149s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 16:08
Static task
static1
Behavioral task
behavioral1
Sample
a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe
Resource
win7-20220901-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe
-
Size
292KB
-
MD5
8c8c9e17ba31e1cad640b2a15f8d4940
-
SHA1
adaba4d962516711e9e4b2ea68d9601e066e0e8d
-
SHA256
a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9
-
SHA512
453d838e90a4b6d573baadf719f53b2588b2cc2813055777aa1b06b300fd22f9d834848513fdb2ddb895949b19d5a6d17c84f0b58ff9be54c20c5c293786f67c
-
SSDEEP
6144:G3y96wgvRHCzOYtqlGyzcsX3KA0LQIQR:OU3gNCpOdn/u
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/3548-135-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/3548-136-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/3548-138-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXC874E311 = "C:\\Windows\\XXXXXXC874E311\\svchsot.exe" a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3548 a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe 3548 a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe 3548 a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe 3548 a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe 3548 a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe 3548 a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3548 a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe"C:\Users\Admin\AppData\Local\Temp\a623084408a04da2f1005235ff60e019109e5ad8139571fc959dda4d85bd1db9.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3548