Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 07:31
Static task
static1
Behavioral task
behavioral1
Sample
940a9b6805bfdaa1523f55d20e5895ad.com.exe
Resource
win7-20230220-en
General
-
Target
940a9b6805bfdaa1523f55d20e5895ad.com.exe
-
Size
18KB
-
MD5
940a9b6805bfdaa1523f55d20e5895ad
-
SHA1
ac37840fd87d9380ed40ab57f9ce411b002c37b6
-
SHA256
33e741219978b766b80213bdc5985c358f5100c297d43e4d30d6eb7794836ade
-
SHA512
c607941be78ae35440b10104a8b80423e00cbc6fa007a0c01b24f5e2460635e8ab9388658328adb0570df0cbfedfd94eb16efe1881367c265da8d4139b0d86f7
-
SSDEEP
384:x7HlMmf8xvauS6Pc6ki2UipTcV1VF0hXHMGBk7/UMQ3BIz:MmqvauSy2/+V1VaXLkj5
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1504-140-0x0000000010000000-0x0000000010014000-memory.dmp family_gh0strat behavioral2/memory/1504-144-0x0000000003570000-0x00000000036BA000-memory.dmp family_gh0strat behavioral2/memory/1504-149-0x0000000002360000-0x00000000023B6000-memory.dmp family_gh0strat behavioral2/memory/1504-157-0x00000000008D0000-0x00000000008E2000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
Processes:
zipdata.tmppid process 1504 zipdata.tmp -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
zipdata.tmpdescription ioc process File opened (read-only) \??\I: zipdata.tmp File opened (read-only) \??\M: zipdata.tmp File opened (read-only) \??\R: zipdata.tmp File opened (read-only) \??\S: zipdata.tmp File opened (read-only) \??\U: zipdata.tmp File opened (read-only) \??\Y: zipdata.tmp File opened (read-only) \??\G: zipdata.tmp File opened (read-only) \??\N: zipdata.tmp File opened (read-only) \??\E: zipdata.tmp File opened (read-only) \??\F: zipdata.tmp File opened (read-only) \??\L: zipdata.tmp File opened (read-only) \??\O: zipdata.tmp File opened (read-only) \??\P: zipdata.tmp File opened (read-only) \??\Q: zipdata.tmp File opened (read-only) \??\Z: zipdata.tmp File opened (read-only) \??\B: zipdata.tmp File opened (read-only) \??\H: zipdata.tmp File opened (read-only) \??\J: zipdata.tmp File opened (read-only) \??\K: zipdata.tmp File opened (read-only) \??\T: zipdata.tmp File opened (read-only) \??\V: zipdata.tmp File opened (read-only) \??\W: zipdata.tmp File opened (read-only) \??\X: zipdata.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
zipdata.tmpdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 zipdata.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz zipdata.tmp -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
940a9b6805bfdaa1523f55d20e5895ad.com.exezipdata.tmppid process 2488 940a9b6805bfdaa1523f55d20e5895ad.com.exe 2488 940a9b6805bfdaa1523f55d20e5895ad.com.exe 2488 940a9b6805bfdaa1523f55d20e5895ad.com.exe 2488 940a9b6805bfdaa1523f55d20e5895ad.com.exe 1504 zipdata.tmp 1504 zipdata.tmp 1504 zipdata.tmp 1504 zipdata.tmp 1504 zipdata.tmp 1504 zipdata.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
940a9b6805bfdaa1523f55d20e5895ad.com.exedescription pid process target process PID 2488 wrote to memory of 1504 2488 940a9b6805bfdaa1523f55d20e5895ad.com.exe zipdata.tmp PID 2488 wrote to memory of 1504 2488 940a9b6805bfdaa1523f55d20e5895ad.com.exe zipdata.tmp PID 2488 wrote to memory of 1504 2488 940a9b6805bfdaa1523f55d20e5895ad.com.exe zipdata.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\940a9b6805bfdaa1523f55d20e5895ad.com.exe"C:\Users\Admin\AppData\Local\Temp\940a9b6805bfdaa1523f55d20e5895ad.com.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Public\Downloads\zipdata.tmp"C:\Users\Public\Downloads\zipdata.tmp"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5940a9b6805bfdaa1523f55d20e5895ad
SHA1ac37840fd87d9380ed40ab57f9ce411b002c37b6
SHA25633e741219978b766b80213bdc5985c358f5100c297d43e4d30d6eb7794836ade
SHA512c607941be78ae35440b10104a8b80423e00cbc6fa007a0c01b24f5e2460635e8ab9388658328adb0570df0cbfedfd94eb16efe1881367c265da8d4139b0d86f7
-
Filesize
18KB
MD5940a9b6805bfdaa1523f55d20e5895ad
SHA1ac37840fd87d9380ed40ab57f9ce411b002c37b6
SHA25633e741219978b766b80213bdc5985c358f5100c297d43e4d30d6eb7794836ade
SHA512c607941be78ae35440b10104a8b80423e00cbc6fa007a0c01b24f5e2460635e8ab9388658328adb0570df0cbfedfd94eb16efe1881367c265da8d4139b0d86f7