Analysis
-
max time kernel
152s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b.exe
Resource
win10v2004-20230915-en
General
-
Target
bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b.exe
-
Size
388KB
-
MD5
35f66c79f4dfcc11119c020cca13821e
-
SHA1
dcc8b9b4f72c4f26e0ad4144db5aaf1f6089e941
-
SHA256
bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b
-
SHA512
b8db6628ff63bba28927e2d76a127caa17f3c1cce6dd7a180c7fa09b1c88af7b522c4b2a85864a8f0025232dff6aaf0e874abb5a7d81c84fa59cc0ede1ebf9b0
-
SSDEEP
6144:fIyLEbWaR5Cc37a3vs16lF4GMunOucTTTTrJi:wUaWaR5v37a3vF2GMYOuH
Malware Config
Extracted
gh0strat
82.156.159.199
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2080-0-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 1044 dll.exe 2984 dll.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\dll.exe bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b.exe File opened for modification C:\Program Files (x86)\dll.exe bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2080 bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b.exe 1044 dll.exe 2984 dll.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2080 bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2984 1044 dll.exe 31 PID 1044 wrote to memory of 2984 1044 dll.exe 31 PID 1044 wrote to memory of 2984 1044 dll.exe 31 PID 1044 wrote to memory of 2984 1044 dll.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b.exe"C:\Users\Admin\AppData\Local\Temp\bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2080
-
C:\Program Files (x86)\dll.exe"C:\Program Files (x86)\dll.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\dll.exe"C:\Program Files (x86)\dll.exe" Win72⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD535f66c79f4dfcc11119c020cca13821e
SHA1dcc8b9b4f72c4f26e0ad4144db5aaf1f6089e941
SHA256bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b
SHA512b8db6628ff63bba28927e2d76a127caa17f3c1cce6dd7a180c7fa09b1c88af7b522c4b2a85864a8f0025232dff6aaf0e874abb5a7d81c84fa59cc0ede1ebf9b0
-
Filesize
388KB
MD535f66c79f4dfcc11119c020cca13821e
SHA1dcc8b9b4f72c4f26e0ad4144db5aaf1f6089e941
SHA256bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b
SHA512b8db6628ff63bba28927e2d76a127caa17f3c1cce6dd7a180c7fa09b1c88af7b522c4b2a85864a8f0025232dff6aaf0e874abb5a7d81c84fa59cc0ede1ebf9b0
-
Filesize
388KB
MD535f66c79f4dfcc11119c020cca13821e
SHA1dcc8b9b4f72c4f26e0ad4144db5aaf1f6089e941
SHA256bc90f2e42eeb0cb11f141829067265410b605dddfa64ed353cbc3a47613c0e4b
SHA512b8db6628ff63bba28927e2d76a127caa17f3c1cce6dd7a180c7fa09b1c88af7b522c4b2a85864a8f0025232dff6aaf0e874abb5a7d81c84fa59cc0ede1ebf9b0