Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 05:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe
-
Size
1.1MB
-
MD5
888a02b5fd45cb9cc5b42463fe862f24
-
SHA1
d1d447dc8820b126d04c69bdc259d0ba2cb56de4
-
SHA256
21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935
-
SHA512
593bdac019f0b5805638b1fbbe863011d5505c6a1e9d083654e10720bad7dec9e9465c06ab6180e7664d785963185fb7b47f5669ef48776691da606d5f5b9802
-
SSDEEP
24576:eNBC4UkXXIoOda/ESxBRlfVnj8PDVj4rJOYt9OA5H1vbndKp:KUkXSa/EmBLfVnoPZcrsY3OAHjd6
Malware Config
Extracted
Family
gh0strat
C2
154.22.235.79
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/340-13076-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral2/memory/340-13079-0x0000000000400000-0x0000000000584000-memory.dmp family_gh0strat -
Suspicious use of NtSetInformationThreadHideFromDebugger 26 IoCs
pid Process 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe 340 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe"C:\Users\Admin\AppData\Local\Temp\21928a656c364e11b3ed14f483a1ab409e0e4940d958f493482bb294d64d1935.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
PID:340