Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:53
Behavioral task
behavioral1
Sample
0cea01a8a4723f915329efe81ae32a71.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cea01a8a4723f915329efe81ae32a71.exe
Resource
win10v2004-20231222-en
General
-
Target
0cea01a8a4723f915329efe81ae32a71.exe
-
Size
329KB
-
MD5
0cea01a8a4723f915329efe81ae32a71
-
SHA1
07a1ddb2e735cb70c25e195eb84eb5470a40d621
-
SHA256
6ddd0e5824f278587250708c05a3228ee7bec75b57f3be0f6574c8c90306182c
-
SHA512
f35879f9fba242a7aa648c88e910d8e329afb1c32582c3294204159b261918f1efc6c6405102881a5d10c22bfcff991fc202adcfadcc19ccbade97e5e1127688
-
SSDEEP
3072:mxjMQVacnG3icUkYdT45/NEGI/Lc+EINkzT1diLUEuBfYcORhSrmz:mxjlVJnQiGP/evc2gT1Wchmz
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/3028-9-0x0000000000400000-0x00000000004F0000-memory.dmp family_gh0strat behavioral1/memory/2956-11-0x0000000000400000-0x00000000004F0000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 3028 svchest000.exe -
resource yara_rule behavioral1/memory/2956-0-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral1/files/0x0010000000012251-5.dat upx behavioral1/memory/3028-8-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral1/memory/3028-9-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral1/memory/2956-11-0x0000000000400000-0x00000000004F0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0cea01a8a4723f915329efe81ae32a71.exe" 0cea01a8a4723f915329efe81ae32a71.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 0cea01a8a4723f915329efe81ae32a71.exe File opened for modification \??\c:\Windows\BJ.exe 0cea01a8a4723f915329efe81ae32a71.exe File created \??\c:\Windows\svchest000.exe 0cea01a8a4723f915329efe81ae32a71.exe File opened for modification \??\c:\Windows\svchest000.exe 0cea01a8a4723f915329efe81ae32a71.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 3028 2956 0cea01a8a4723f915329efe81ae32a71.exe 28 PID 2956 wrote to memory of 3028 2956 0cea01a8a4723f915329efe81ae32a71.exe 28 PID 2956 wrote to memory of 3028 2956 0cea01a8a4723f915329efe81ae32a71.exe 28 PID 2956 wrote to memory of 3028 2956 0cea01a8a4723f915329efe81ae32a71.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cea01a8a4723f915329efe81ae32a71.exe"C:\Users\Admin\AppData\Local\Temp\0cea01a8a4723f915329efe81ae32a71.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\Windows\svchest000.exec:\Windows\svchest000.exe2⤵
- Executes dropped EXE
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329KB
MD50cea01a8a4723f915329efe81ae32a71
SHA107a1ddb2e735cb70c25e195eb84eb5470a40d621
SHA2566ddd0e5824f278587250708c05a3228ee7bec75b57f3be0f6574c8c90306182c
SHA512f35879f9fba242a7aa648c88e910d8e329afb1c32582c3294204159b261918f1efc6c6405102881a5d10c22bfcff991fc202adcfadcc19ccbade97e5e1127688