Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
21/11/2023, 03:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe
Resource
win7-20231025-en
5 signatures
150 seconds
General
-
Target
04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe
-
Size
1.0MB
-
MD5
3374fbe1f5275dbe9c4cc5c0d1f3d68a
-
SHA1
7b0dc5e6344ee69e65c2f2de081c6974f1b47108
-
SHA256
04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067
-
SHA512
04b544faddea26106b37035b22d8783ce9e531e71defb007974d0e404a0318aa27aa28d495880bb83b4fa66763136a1ed4119ee8bdd1d2c777fc30252f8d7798
-
SSDEEP
24576:j5ivkcQJmbrZHv4H8dB6TPuyBez8O89E8ZHLC:jQOuVHv4H8dB6TPzBuo9E+W
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2220-8697-0x0000000000400000-0x0000000000573000-memory.dmp family_gh0strat -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2220 04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe"C:\Users\Admin\AppData\Local\Temp\04fa91caed041e182fc2781093b24b479172ea1af61f357fef168af63c611067.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: RenamesItself
PID:2220