Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/04/2023, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
caece8f8ccb77b8a3e2ee14770e2c4b734a8573b8a0dc676be0782e27389182a.exe
Resource
win7-20230220-en
6 signatures
150 seconds
General
-
Target
caece8f8ccb77b8a3e2ee14770e2c4b734a8573b8a0dc676be0782e27389182a.exe
-
Size
310KB
-
MD5
65deedccc1dcbe6b1cbc074c3855e0ba
-
SHA1
0d5051e9329194a96f8836082f6e308b3520a495
-
SHA256
caece8f8ccb77b8a3e2ee14770e2c4b734a8573b8a0dc676be0782e27389182a
-
SHA512
c1ad0acaa2ed39ee15eb63a0c0d198862d7fc6135858c4e69ca6f901a21c42dbeb03e4429f19d3e4fd977ddd92033b8b7edff99be13c8d5d9df64f7d7695444d
-
SSDEEP
3072:VNWlkU/r+37BO8ynhvd01vYJPp9Hfj/NTNW95xpIImWKyB:V4l9+3QZd0QPp9HfZu5LIImWv
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/1704-64-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat behavioral1/memory/1704-63-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat behavioral1/memory/836-75-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat behavioral1/memory/836-80-0x0000000002C40000-0x0000000002D8C000-memory.dmp family_gh0strat behavioral1/memory/836-79-0x0000000002C40000-0x0000000002D8C000-memory.dmp family_gh0strat behavioral1/memory/836-82-0x0000000002C40000-0x0000000002D8C000-memory.dmp family_gh0strat behavioral1/memory/836-86-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat behavioral1/memory/836-84-0x0000000002C40000-0x0000000002D8C000-memory.dmp family_gh0strat -
Blocklisted process makes network request 2 IoCs
flow pid Process 7 836 cmd.exe 8 836 cmd.exe -
resource yara_rule behavioral1/memory/1704-60-0x0000000010000000-0x0000000010011000-memory.dmp upx behavioral1/memory/1704-64-0x0000000010000000-0x0000000010011000-memory.dmp upx behavioral1/memory/1704-63-0x0000000010000000-0x0000000010011000-memory.dmp upx behavioral1/memory/836-75-0x0000000010000000-0x0000000010011000-memory.dmp upx behavioral1/memory/836-76-0x0000000002C40000-0x0000000002D8C000-memory.dmp upx behavioral1/memory/836-80-0x0000000002C40000-0x0000000002D8C000-memory.dmp upx behavioral1/memory/836-79-0x0000000002C40000-0x0000000002D8C000-memory.dmp upx behavioral1/memory/836-82-0x0000000002C40000-0x0000000002D8C000-memory.dmp upx behavioral1/memory/836-86-0x0000000010000000-0x0000000010011000-memory.dmp upx behavioral1/memory/836-84-0x0000000002C40000-0x0000000002D8C000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe 836 cmd.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1704 wrote to memory of 836 1704 caece8f8ccb77b8a3e2ee14770e2c4b734a8573b8a0dc676be0782e27389182a.exe 30 PID 1704 wrote to memory of 836 1704 caece8f8ccb77b8a3e2ee14770e2c4b734a8573b8a0dc676be0782e27389182a.exe 30 PID 1704 wrote to memory of 836 1704 caece8f8ccb77b8a3e2ee14770e2c4b734a8573b8a0dc676be0782e27389182a.exe 30 PID 1704 wrote to memory of 836 1704 caece8f8ccb77b8a3e2ee14770e2c4b734a8573b8a0dc676be0782e27389182a.exe 30 PID 1704 wrote to memory of 836 1704 caece8f8ccb77b8a3e2ee14770e2c4b734a8573b8a0dc676be0782e27389182a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\caece8f8ccb77b8a3e2ee14770e2c4b734a8573b8a0dc676be0782e27389182a.exe"C:\Users\Admin\AppData\Local\Temp\caece8f8ccb77b8a3e2ee14770e2c4b734a8573b8a0dc676be0782e27389182a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe -Puppet2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:836
-