Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2023 14:56
Behavioral task
behavioral1
Sample
NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe
-
Size
10.1MB
-
MD5
0afb464d2654193dac667c26a24afbd0
-
SHA1
cc52ed0e0caba7a3dab7b40f4d06605205d8a9df
-
SHA256
8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4
-
SHA512
2290595bb7bc96b7d46ccce660c808bf58d18802e82f89407e6887d030e66ebe636c35fe917aed1c95f74387aab7c0f4a449f17749a8e58b8066b28c38ac4e5d
-
SSDEEP
6144:1IposGo+OMpe4HMHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHf:SpodaMo4Y
Malware Config
Extracted
gh0strat
127.0.0.1
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/2872-1-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral2/memory/2872-6-0x0000000000400000-0x0000000000465000-memory.dmp family_gh0strat -
resource yara_rule behavioral2/memory/2872-0-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral2/memory/2872-6-0x0000000000400000-0x0000000000465000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe" NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2872 NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe 2872 NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe 2872 NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe 2872 NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe 2872 NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe 2872 NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2872