Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
20/11/2023, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
d602b58af05fe8fd29ac7293b493ced48232ae2a19423f3f8f8db8cfd541c11e.exe
Resource
win7-20231020-en
General
-
Target
d602b58af05fe8fd29ac7293b493ced48232ae2a19423f3f8f8db8cfd541c11e.exe
-
Size
2.5MB
-
MD5
7f1cf479b6aa478a890f97990ee79a51
-
SHA1
e64846493a16d7785e4de4aa58d436ed7b419c2c
-
SHA256
d602b58af05fe8fd29ac7293b493ced48232ae2a19423f3f8f8db8cfd541c11e
-
SHA512
1475585b2a4b4662cd3e227c627e6f740b30198a102b6a9af7fa9f04d257f6603c6198fc101239016577c1e4ec8bb28dcc384bf788db7d5c6b58e4bffadd57b6
-
SSDEEP
49152:Sd4n+zgsFd7Cgc/wgjyxzfV/3CEz4KJmg7657qwnu3glU7dTu:dCgs2KJmg7692OUE
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2836-31-0x00000000025B0000-0x000000000262B000-memory.dmp family_gh0strat behavioral1/memory/2836-60-0x0000000000970000-0x0000000000A06000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2836 VAxplorer.exe -
Loads dropped DLL 3 IoCs
pid Process 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: VAxplorer.exe File opened (read-only) \??\I: VAxplorer.exe File opened (read-only) \??\K: VAxplorer.exe File opened (read-only) \??\N: VAxplorer.exe File opened (read-only) \??\O: VAxplorer.exe File opened (read-only) \??\P: VAxplorer.exe File opened (read-only) \??\R: VAxplorer.exe File opened (read-only) \??\S: VAxplorer.exe File opened (read-only) \??\U: VAxplorer.exe File opened (read-only) \??\X: VAxplorer.exe File opened (read-only) \??\B: VAxplorer.exe File opened (read-only) \??\E: VAxplorer.exe File opened (read-only) \??\G: VAxplorer.exe File opened (read-only) \??\L: VAxplorer.exe File opened (read-only) \??\M: VAxplorer.exe File opened (read-only) \??\H: VAxplorer.exe File opened (read-only) \??\J: VAxplorer.exe File opened (read-only) \??\Q: VAxplorer.exe File opened (read-only) \??\V: VAxplorer.exe File opened (read-only) \??\W: VAxplorer.exe File opened (read-only) \??\Y: VAxplorer.exe File opened (read-only) \??\Z: VAxplorer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VAxplorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz VAxplorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe 2836 VAxplorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2836 1212 d602b58af05fe8fd29ac7293b493ced48232ae2a19423f3f8f8db8cfd541c11e.exe 28 PID 1212 wrote to memory of 2836 1212 d602b58af05fe8fd29ac7293b493ced48232ae2a19423f3f8f8db8cfd541c11e.exe 28 PID 1212 wrote to memory of 2836 1212 d602b58af05fe8fd29ac7293b493ced48232ae2a19423f3f8f8db8cfd541c11e.exe 28 PID 1212 wrote to memory of 2836 1212 d602b58af05fe8fd29ac7293b493ced48232ae2a19423f3f8f8db8cfd541c11e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d602b58af05fe8fd29ac7293b493ced48232ae2a19423f3f8f8db8cfd541c11e.exe"C:\Users\Admin\AppData\Local\Temp\d602b58af05fe8fd29ac7293b493ced48232ae2a19423f3f8f8db8cfd541c11e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Public\VAxplorer\VAxplorer.exe"C:\Users\Public\VAxplorer\VAxplorer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5bc83108b18756547013ed443b8cdb31b
SHA179bcaad3714433e01c7f153b05b781f8d7cb318d
SHA256b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671
SHA5126e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
61B
MD58ed7609fae6a7df701e1e791d67fadd2
SHA186ad5aef5e2e6f62ef424aab2fc5190175e4ed73
SHA256378d92af812e7a684d52a9a7ccef391de413d27a4f7376078b02079e7b862b6c
SHA5125dfa0c063d713bb7a014ff817ea1e99cf5818ba7df7b964a5e072d0cf90f314d4ce73978291092927b291b0276ae10a44b2c3f95e799378616b5fbd39e1c1fcd
-
Filesize
678KB
MD589c753dfc41e368f0907d3b2ecf46279
SHA1439e2649923476fbfe9e85a9f3eee0b201e6f1ba
SHA256354f09fd303d2c339e288f4af5bb1017a5df8c97a67ed3ccd2b85f07d8700972
SHA512dcc5a5336d8562e2a015aa377c12c8419a3b913e5d567afd08995ff54f67b42956b65ac90c375ad72d39431bbb857010984a0f28c9a2764b1c26c14c915d4f52
-
Filesize
576KB
MD59a98c294c1154222b4c21a3864dba039
SHA166c107c565206ef27b330e08c5d6d67c18e336e5
SHA256f69a5988f447e6977699761bec7e88032503a981dc12872cb5b688ce0473b400
SHA512b76abb095ca814fefb1f8f742b92d9740b87956e0fe1111c860fad2385820b5e8874557026800246a4b75f10df72671d013517465a24dfe1c1f26ee3dfc0fe0a
-
Filesize
558KB
MD581b0085bd2e701a3aa178d9e51fe3016
SHA17a2c2aec8d7a6a6a282f09b8f28883b51fe7a005
SHA2560806be5c1993c9468bae252b5d241d45069c77332a8eb8b9a8b2150b1fe7ffea
SHA512ee1a5fdabefc4ee86526a33c1b61f25d4d0e74b349fd2e994bdcee3ad33961eb1eb49b9793f8a968902ab6530d25158491747c627cdf33ed3573b9e957ce4971
-
Filesize
86B
MD55be0df210353fe909e869c4c90dded0b
SHA14b7b7bf5d10651745459f2af36d47dce65d26889
SHA256c57b13148534ef6b221e9de523940c18035e6a11eb5376052421b08688ab8a01
SHA512658ff889ab286b2b8185e1bec839b6d2f743898fd7749452af87f12b7b2424a98c9dc758674546ece66fecf9d264567d33d5606fc153b151b2cb756252475c8c
-
Filesize
558KB
MD581b0085bd2e701a3aa178d9e51fe3016
SHA17a2c2aec8d7a6a6a282f09b8f28883b51fe7a005
SHA2560806be5c1993c9468bae252b5d241d45069c77332a8eb8b9a8b2150b1fe7ffea
SHA512ee1a5fdabefc4ee86526a33c1b61f25d4d0e74b349fd2e994bdcee3ad33961eb1eb49b9793f8a968902ab6530d25158491747c627cdf33ed3573b9e957ce4971
-
Filesize
411KB
MD5bc83108b18756547013ed443b8cdb31b
SHA179bcaad3714433e01c7f153b05b781f8d7cb318d
SHA256b2ad109c15eaa92079582787b7772ba0a2f034f7d075907ff87028df0eaea671
SHA5126e72b2d40e47567b3e506be474dafa7cacd0b53cd2c2d160c3b5384f2f461fc91bb5fdb614a351f628d4e516b3bbdabc2cc6d4cb4710970146d2938a687dd011
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630