Analysis

  • max time kernel
    36s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22/05/2023, 18:35

General

  • Target

    2d738acd8694aac90741f55be519571b24fe4de3ed4da21554a8651fdbf5f3a9.exe

  • Size

    84KB

  • MD5

    4bf09b008ef52cef6b3444594e251ea4

  • SHA1

    6a6b2e029f1eaa7efd649ac147d678725dff16b4

  • SHA256

    2d738acd8694aac90741f55be519571b24fe4de3ed4da21554a8651fdbf5f3a9

  • SHA512

    f45399c62334bfdccc8ce17256e6dd20b34d29378029a1ef0c1d1beae42f7bcc4d19045a56376b9dbb434c6a7f345d1b3bd8b48a441113c32e4cea3b4b351d92

  • SSDEEP

    768:YlTaZhPyrQ0VOFX8bFj7+WMZ5k2bqDNPgwS7QNMttMixnpXZIK2A+q8+GWP9:Um3y0wiXajqWMXkrNPXS7AunpX+K29M

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d738acd8694aac90741f55be519571b24fe4de3ed4da21554a8651fdbf5f3a9.exe
    "C:\Users\Admin\AppData\Local\Temp\2d738acd8694aac90741f55be519571b24fe4de3ed4da21554a8651fdbf5f3a9.exe"
    1⤵
    • Adds Run key to start application
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1900-54-0x0000000002160000-0x00000000021AE000-memory.dmp

    Filesize

    312KB

  • memory/1900-55-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/1900-60-0x0000000003000000-0x0000000003140000-memory.dmp

    Filesize

    1.2MB