Analysis
-
max time kernel
214s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:47
Behavioral task
behavioral1
Sample
03bf3bc2965422d85c0b99f0e641af29.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03bf3bc2965422d85c0b99f0e641af29.exe
Resource
win10v2004-20231215-en
General
-
Target
03bf3bc2965422d85c0b99f0e641af29.exe
-
Size
794KB
-
MD5
03bf3bc2965422d85c0b99f0e641af29
-
SHA1
82d0de1bd77a63a4ef1869095d484100b55184fc
-
SHA256
f853e3d2979b5dee2cc4c6ca3b07d85ae2892f4c8b90e7401cfcc58d2e8edffe
-
SHA512
0e7fe7bfcf858962e8cf230cb06a2fc24d77075e7002a5b63aad5ee7939f96df643e05afe3e60e52a9b5ef411ca3679f4cda25edce67994f44b9e4abd60aa950
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZKcA:iM5j8Z3aKHx5r+TuxX+IwffFZKcA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000012274-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2900 svchest001465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 03bf3bc2965422d85c0b99f0e641af29.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\notepab.exe 03bf3bc2965422d85c0b99f0e641af29.exe File opened for modification \??\c:\Windows\svchest001465662051.exe 03bf3bc2965422d85c0b99f0e641af29.exe File opened for modification \??\c:\Windows\BJ.exe 03bf3bc2965422d85c0b99f0e641af29.exe File created \??\c:\Windows\BJ.exe 03bf3bc2965422d85c0b99f0e641af29.exe File created \??\c:\Windows\svchest001465662051.exe 03bf3bc2965422d85c0b99f0e641af29.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2900 2584 03bf3bc2965422d85c0b99f0e641af29.exe 29 PID 2584 wrote to memory of 2900 2584 03bf3bc2965422d85c0b99f0e641af29.exe 29 PID 2584 wrote to memory of 2900 2584 03bf3bc2965422d85c0b99f0e641af29.exe 29 PID 2584 wrote to memory of 2900 2584 03bf3bc2965422d85c0b99f0e641af29.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\03bf3bc2965422d85c0b99f0e641af29.exe"C:\Users\Admin\AppData\Local\Temp\03bf3bc2965422d85c0b99f0e641af29.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\Windows\svchest001465662051.exec:\Windows\svchest001465662051.exe2⤵
- Executes dropped EXE
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
794KB
MD503bf3bc2965422d85c0b99f0e641af29
SHA182d0de1bd77a63a4ef1869095d484100b55184fc
SHA256f853e3d2979b5dee2cc4c6ca3b07d85ae2892f4c8b90e7401cfcc58d2e8edffe
SHA5120e7fe7bfcf858962e8cf230cb06a2fc24d77075e7002a5b63aad5ee7939f96df643e05afe3e60e52a9b5ef411ca3679f4cda25edce67994f44b9e4abd60aa950