Analysis

  • max time kernel
    151s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 21:12

General

  • Target

    a15ee6f25dee4059a845c4310e61c34d2ac0722d1ed7a2653be92d9d0beb9450.exe

  • Size

    790KB

  • MD5

    938f5ee5e3777f00da37c7469b97a9e7

  • SHA1

    1cb9c94fd022a32ccfb5ae57b78f6d26ec6db754

  • SHA256

    a15ee6f25dee4059a845c4310e61c34d2ac0722d1ed7a2653be92d9d0beb9450

  • SHA512

    ecdcdcd1606c64e45ab5501b5c17741343beae6d239bdb08761e3a8950edd3dfd59b955e3d7be7295c309796a6eaf6d54ed5c0bd91cce7511eebc4bb0d2163cd

  • SSDEEP

    12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZv:iM5j8Z3aKHx5r+TuxX+IwffFZv

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a15ee6f25dee4059a845c4310e61c34d2ac0722d1ed7a2653be92d9d0beb9450.exe
    "C:\Users\Admin\AppData\Local\Temp\a15ee6f25dee4059a845c4310e61c34d2ac0722d1ed7a2653be92d9d0beb9450.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:784
    • \??\c:\Windows\svchest001465662051.exe
      c:\Windows\svchest001465662051.exe
      2⤵
      • Executes dropped EXE
      PID:1984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchest001465662051.exe

    Filesize

    790KB

    MD5

    27b52640bb86d3856855757c5535e570

    SHA1

    89ce3b947a3a5f197c0844587a1f17bc2e98a6c4

    SHA256

    e46e02ffe8c584700380a55a158713103db7085c3c51d911e93f3ce66689dbdc

    SHA512

    4278199bcf5a93b4652ee5ef8c9edfdedf8c07bbf76e55633f9d85dd18dcd2047051b0e06eb7ed34bf2e884e999cf9095f54054905bf32a3710bca5ff7f55499

  • memory/784-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

    Filesize

    8KB