Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 15:21
Behavioral task
behavioral1
Sample
0383d9b89c79c31c78dc3fc01b6bd4fb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0383d9b89c79c31c78dc3fc01b6bd4fb.exe
Resource
win10v2004-20231215-en
General
-
Target
0383d9b89c79c31c78dc3fc01b6bd4fb.exe
-
Size
668KB
-
MD5
0383d9b89c79c31c78dc3fc01b6bd4fb
-
SHA1
dd2c003bef0b2b9800404178a5582af4cf86d5ad
-
SHA256
66fd0db31f99ed1ca05b961ab1a86ec56d3d54e3cef269ed906be1c32d302f02
-
SHA512
0ccac8a7a18a6cb9afefe44234462b34c967b4c467dc3513595554dcdb724016f7eecb8622799246ca26fe9b8cb100af12275c066b2eb91302ad88f955a39b86
-
SSDEEP
12288:3/eC0vZVQQxfnr+TK7r79/JenWAG36ATphjM5Bv9:3/XwVQQxfnr+TK7r79/Je3GqArjM5Bv9
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x00070000000231fe-5.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 4976 svchest425112042511200.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 0383d9b89c79c31c78dc3fc01b6bd4fb.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\Windows\BJ.exe 0383d9b89c79c31c78dc3fc01b6bd4fb.exe File created \??\c:\Windows\svchest425112042511200.exe 0383d9b89c79c31c78dc3fc01b6bd4fb.exe File opened for modification \??\c:\Windows\svchest425112042511200.exe 0383d9b89c79c31c78dc3fc01b6bd4fb.exe File created \??\c:\Windows\notepab.exe 0383d9b89c79c31c78dc3fc01b6bd4fb.exe File created \??\c:\Windows\BJ.exe 0383d9b89c79c31c78dc3fc01b6bd4fb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4976 4456 0383d9b89c79c31c78dc3fc01b6bd4fb.exe 88 PID 4456 wrote to memory of 4976 4456 0383d9b89c79c31c78dc3fc01b6bd4fb.exe 88 PID 4456 wrote to memory of 4976 4456 0383d9b89c79c31c78dc3fc01b6bd4fb.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0383d9b89c79c31c78dc3fc01b6bd4fb.exe"C:\Users\Admin\AppData\Local\Temp\0383d9b89c79c31c78dc3fc01b6bd4fb.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4456 -
\??\c:\Windows\svchest425112042511200.exec:\Windows\svchest425112042511200.exe2⤵
- Executes dropped EXE
PID:4976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
668KB
MD50383d9b89c79c31c78dc3fc01b6bd4fb
SHA1dd2c003bef0b2b9800404178a5582af4cf86d5ad
SHA25666fd0db31f99ed1ca05b961ab1a86ec56d3d54e3cef269ed906be1c32d302f02
SHA5120ccac8a7a18a6cb9afefe44234462b34c967b4c467dc3513595554dcdb724016f7eecb8622799246ca26fe9b8cb100af12275c066b2eb91302ad88f955a39b86