Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 15:50
Behavioral task
behavioral1
Sample
04633c60e3edc0fec19defb750e2cfd0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
04633c60e3edc0fec19defb750e2cfd0.exe
Resource
win10v2004-20231215-en
General
-
Target
04633c60e3edc0fec19defb750e2cfd0.exe
-
Size
920KB
-
MD5
04633c60e3edc0fec19defb750e2cfd0
-
SHA1
050f30070bec6d1287b698b2727770d8a94d0b8e
-
SHA256
e22b01b3e9fbf507b295b4eaf636cf2dac724e2463567d695e31032ff0898ed1
-
SHA512
194251d8490e876f3919bbcc0d89edd3b1b6da655b1552e9cdb2e4fcae613d3a4e60f9f788a83f15e8a874c14cc0554b3087f695677c115df7ce027568a1c7f0
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZ1vqT:iM5j8Z3aKHx5r+TuxX+IwffFZ1vqT
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0013000000023138-4.dat family_gh0strat behavioral2/files/0x0013000000023138-6.dat family_gh0strat behavioral2/files/0x0013000000023138-5.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 4872 svchest432048043204801465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 04633c60e3edc0fec19defb750e2cfd0.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 04633c60e3edc0fec19defb750e2cfd0.exe File opened for modification \??\c:\Windows\BJ.exe 04633c60e3edc0fec19defb750e2cfd0.exe File created \??\c:\Windows\svchest432048043204801465662051.exe 04633c60e3edc0fec19defb750e2cfd0.exe File opened for modification \??\c:\Windows\svchest432048043204801465662051.exe 04633c60e3edc0fec19defb750e2cfd0.exe File created \??\c:\Windows\notepab.exe 04633c60e3edc0fec19defb750e2cfd0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5104 wrote to memory of 4872 5104 04633c60e3edc0fec19defb750e2cfd0.exe 58 PID 5104 wrote to memory of 4872 5104 04633c60e3edc0fec19defb750e2cfd0.exe 58 PID 5104 wrote to memory of 4872 5104 04633c60e3edc0fec19defb750e2cfd0.exe 58
Processes
-
C:\Users\Admin\AppData\Local\Temp\04633c60e3edc0fec19defb750e2cfd0.exe"C:\Users\Admin\AppData\Local\Temp\04633c60e3edc0fec19defb750e2cfd0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5104 -
\??\c:\Windows\svchest432048043204801465662051.exec:\Windows\svchest432048043204801465662051.exe2⤵
- Executes dropped EXE
PID:4872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD50d0888c016a06a7793da0fff680ad052
SHA1fb8b95033b9d445d2002e68e0e3e089e0b8b17c5
SHA25616ed6749c7059d21d16d7d24c171b6ac2818f7ee77507c701f4859fbd0b3de9c
SHA51206c52002eaa5ec741d08087dd7d9fdd4c3d9f8f259d1420703ec4d871c9479faf561fe7c84b76050f8ebd5c3aaeffd56aab332423fe17579fdd1c51a85e4eb19
-
Filesize
288KB
MD5ad4d237e9036f7a4a0a933b0ae4b0e43
SHA1aae262b767413eb88370a91af14f98179fbb9aa9
SHA256af7e94718971e69d658cb772e8fe1065ed8c2bb49d42d1957eed4d850dfc00b2
SHA5127ea387176cabb7bccdb47dfed72c96946522f6ff86975f1b480abe08c22037632ec7208b588720d89391ef8a769b1c1e0e011973bbf424e1d7a86b4faf569863
-
Filesize
243KB
MD5a0235a236558927f5eaa22e2adef0bc1
SHA18a162989a4e6546601dcf3a7c5ced8d236813112
SHA2561284dfaca7cc285df88c8b59a77850e1c515b92c18fdbe893ce8ef8fdf8ca7e5
SHA51200749c582383a5687e52fdd148a4ff01f1c3875f600b2523e6d9260a18149b52c74b66f244799d5802b4b3f8df8d047e0d39dc1483e6856a23092da52c545635