Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 07:35
Behavioral task
behavioral1
Sample
0f357f6420cd0160871d90a0abdcbaa5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f357f6420cd0160871d90a0abdcbaa5.exe
Resource
win10v2004-20231215-en
General
-
Target
0f357f6420cd0160871d90a0abdcbaa5.exe
-
Size
526KB
-
MD5
0f357f6420cd0160871d90a0abdcbaa5
-
SHA1
983644e7aaaf5f17ccc0c4a4bf813e782db041b8
-
SHA256
447b3520e8e7fd11e709a4916d08511c21830c53b3b6ad7c6abe8280f098fb56
-
SHA512
5cac08fdd93dc4c018814467e160f761d65786e37b32674866ae41ab51d6190255c24b4e800b50eae4aac834ca7e0bc49955a1479eba66f10108b518f08b594f
-
SSDEEP
12288:q08PKZVQQxfnr+TK7r79/J0NWNf37JcAayM5ahHjc:t8AVQQxfnr+TK7r79/J0ofrJEyM5ahDc
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000c0000000141c0-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1076 (null)0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0f357f6420cd0160871d90a0abdcbaa5.exe" 0f357f6420cd0160871d90a0abdcbaa5.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\Windows\BJ.exe 0f357f6420cd0160871d90a0abdcbaa5.exe File created \??\c:\Windows\BJ.exe 0f357f6420cd0160871d90a0abdcbaa5.exe File created \??\c:\Windows\(null)0.exe 0f357f6420cd0160871d90a0abdcbaa5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1076 2324 0f357f6420cd0160871d90a0abdcbaa5.exe 16 PID 2324 wrote to memory of 1076 2324 0f357f6420cd0160871d90a0abdcbaa5.exe 16 PID 2324 wrote to memory of 1076 2324 0f357f6420cd0160871d90a0abdcbaa5.exe 16 PID 2324 wrote to memory of 1076 2324 0f357f6420cd0160871d90a0abdcbaa5.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f357f6420cd0160871d90a0abdcbaa5.exe"C:\Users\Admin\AppData\Local\Temp\0f357f6420cd0160871d90a0abdcbaa5.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\Windows\(null)0.exec:\Windows\(null)0.exe2⤵
- Executes dropped EXE
PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
526KB
MD50f357f6420cd0160871d90a0abdcbaa5
SHA1983644e7aaaf5f17ccc0c4a4bf813e782db041b8
SHA256447b3520e8e7fd11e709a4916d08511c21830c53b3b6ad7c6abe8280f098fb56
SHA5125cac08fdd93dc4c018814467e160f761d65786e37b32674866ae41ab51d6190255c24b4e800b50eae4aac834ca7e0bc49955a1479eba66f10108b518f08b594f