Analysis
-
max time kernel
152s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:03
Behavioral task
behavioral1
Sample
13ac75cc8a0b19b0aaeb77ed62e3fcba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13ac75cc8a0b19b0aaeb77ed62e3fcba.exe
Resource
win10v2004-20231222-en
General
-
Target
13ac75cc8a0b19b0aaeb77ed62e3fcba.exe
-
Size
506KB
-
MD5
13ac75cc8a0b19b0aaeb77ed62e3fcba
-
SHA1
497231f6d1fbd3f9a2550ba94e1798368c5a3c24
-
SHA256
677c95630c76b429d08d79c829891451753ef61e0bf6f3b991c85c91b6a8c265
-
SHA512
51d0d4184c8444eae920f63b2f9b4207a3ee071e1cc4b56f69a6d33c91ea3484a195a70b91f5704bf9f94c5c65c3bbc912c0ba7ac69478261a8ccbf0c4589ea9
-
SSDEEP
12288:g08PKZVQQxfnr+TK7r79/J0NWNf37JcAayM5ahHj6:b8AVQQxfnr+TK7r79/J0ofrJEyM5ahD6
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012280-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2788 (null)0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\13ac75cc8a0b19b0aaeb77ed62e3fcba.exe" 13ac75cc8a0b19b0aaeb77ed62e3fcba.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 13ac75cc8a0b19b0aaeb77ed62e3fcba.exe File opened for modification \??\c:\Windows\BJ.exe 13ac75cc8a0b19b0aaeb77ed62e3fcba.exe File created \??\c:\Windows\(null)0.exe 13ac75cc8a0b19b0aaeb77ed62e3fcba.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2788 1272 13ac75cc8a0b19b0aaeb77ed62e3fcba.exe 28 PID 1272 wrote to memory of 2788 1272 13ac75cc8a0b19b0aaeb77ed62e3fcba.exe 28 PID 1272 wrote to memory of 2788 1272 13ac75cc8a0b19b0aaeb77ed62e3fcba.exe 28 PID 1272 wrote to memory of 2788 1272 13ac75cc8a0b19b0aaeb77ed62e3fcba.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\13ac75cc8a0b19b0aaeb77ed62e3fcba.exe"C:\Users\Admin\AppData\Local\Temp\13ac75cc8a0b19b0aaeb77ed62e3fcba.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1272 -
\??\c:\Windows\(null)0.exec:\Windows\(null)0.exe2⤵
- Executes dropped EXE
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD513ac75cc8a0b19b0aaeb77ed62e3fcba
SHA1497231f6d1fbd3f9a2550ba94e1798368c5a3c24
SHA256677c95630c76b429d08d79c829891451753ef61e0bf6f3b991c85c91b6a8c265
SHA51251d0d4184c8444eae920f63b2f9b4207a3ee071e1cc4b56f69a6d33c91ea3484a195a70b91f5704bf9f94c5c65c3bbc912c0ba7ac69478261a8ccbf0c4589ea9