Analysis
-
max time kernel
165s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 07:27
Behavioral task
behavioral1
Sample
0eb2cbb2367dc5ee034a8866951d9d17.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0eb2cbb2367dc5ee034a8866951d9d17.exe
Resource
win10v2004-20231215-en
General
-
Target
0eb2cbb2367dc5ee034a8866951d9d17.exe
-
Size
536KB
-
MD5
0eb2cbb2367dc5ee034a8866951d9d17
-
SHA1
9f2b3bb04f5c43ac02dee68f2e17abb3c8b08fc6
-
SHA256
67e2310d1bf4ba692e42d96be5997923358c0a77e6379c24a848bfb8f2a65949
-
SHA512
eea5e0e80bb41191e924bc657b4bb4cbd3bf7dde94602d280d39fbe5464d1631fe0cef05288f5412928c0902f2db4d928cf4849ce2ba77ca6920759c64f6b80e
-
SSDEEP
12288:q08PKZVQQxfnr+TK7r79/J0NWNf37JcAayM5ahHj3c:t8AVQQxfnr+TK7r79/J0ofrJEyM5ahDs
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0011000000013a05-7.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2008 (null)0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0eb2cbb2367dc5ee034a8866951d9d17.exe" 0eb2cbb2367dc5ee034a8866951d9d17.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\Windows\BJ.exe 0eb2cbb2367dc5ee034a8866951d9d17.exe File created \??\c:\Windows\BJ.exe 0eb2cbb2367dc5ee034a8866951d9d17.exe File created \??\c:\Windows\(null)0.exe 0eb2cbb2367dc5ee034a8866951d9d17.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2008 2116 0eb2cbb2367dc5ee034a8866951d9d17.exe 27 PID 2116 wrote to memory of 2008 2116 0eb2cbb2367dc5ee034a8866951d9d17.exe 27 PID 2116 wrote to memory of 2008 2116 0eb2cbb2367dc5ee034a8866951d9d17.exe 27 PID 2116 wrote to memory of 2008 2116 0eb2cbb2367dc5ee034a8866951d9d17.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eb2cbb2367dc5ee034a8866951d9d17.exe"C:\Users\Admin\AppData\Local\Temp\0eb2cbb2367dc5ee034a8866951d9d17.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2116 -
\??\c:\Windows\(null)0.exec:\Windows\(null)0.exe2⤵
- Executes dropped EXE
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD50eb2cbb2367dc5ee034a8866951d9d17
SHA19f2b3bb04f5c43ac02dee68f2e17abb3c8b08fc6
SHA25667e2310d1bf4ba692e42d96be5997923358c0a77e6379c24a848bfb8f2a65949
SHA512eea5e0e80bb41191e924bc657b4bb4cbd3bf7dde94602d280d39fbe5464d1631fe0cef05288f5412928c0902f2db4d928cf4849ce2ba77ca6920759c64f6b80e