Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/08/2023, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe
Resource
win10v2004-20230703-en
General
-
Target
e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe
-
Size
988KB
-
MD5
76acad3969c13508bd16dcdfde051f87
-
SHA1
97b8591d89bb86d3c798f7a74c7f9b26d4f306c2
-
SHA256
e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2
-
SHA512
77b114f8d2aacb1e2a533e003613904914863960e0fd4fb911c228a816d32f5b52e4ee688472771b53cab42e42ff083a0b5da97aed5e266b9e0236006efe456a
-
SSDEEP
24576:kYQ4o1ARmENR/2QDWSRpbhuCSAIgEXY49HYRnOBtcJtXSxQK4:s4ks92QDNuvnYG4dOzIXMT4
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2468-10959-0x0000000000400000-0x0000000000513000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2116 Jbrja.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2468 e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe 2468 e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe 2468 e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe 2468 e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe 2468 e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe 2468 e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe 2468 e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe 2468 e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe 2468 e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Jbrja.exe e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe File created C:\Windows\Jbrja.exe e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2468 e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe"C:\Users\Admin\AppData\Local\Temp\e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
C:\Windows\Jbrja.exeC:\\Windows\\Jbrja.exe -auto1⤵
- Executes dropped EXE
PID:2116
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
988KB
MD576acad3969c13508bd16dcdfde051f87
SHA197b8591d89bb86d3c798f7a74c7f9b26d4f306c2
SHA256e22d088079f0525a4135686f20137d47186adca7bac37ab51e4d7ea66ce2c2e2
SHA51277b114f8d2aacb1e2a533e003613904914863960e0fd4fb911c228a816d32f5b52e4ee688472771b53cab42e42ff083a0b5da97aed5e266b9e0236006efe456a