Analysis
-
max time kernel
162s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
192eb3093e6d5ae995718c2efe6251cf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
192eb3093e6d5ae995718c2efe6251cf.exe
Resource
win10v2004-20231215-en
General
-
Target
192eb3093e6d5ae995718c2efe6251cf.exe
-
Size
376KB
-
MD5
192eb3093e6d5ae995718c2efe6251cf
-
SHA1
d8389e8d5c4f5decb0e67ff852f1269485930bb4
-
SHA256
e0414923c79418878319e06ca8403c097280e9668eb3cb1d3b54650bc46dc43b
-
SHA512
0c8d809ed0cefbf7946a07de21f5ca1b9b5086b9be7003d1b93c3ebb33e1aed0f795f4fdc714a0185436386eead646093fd0d3c4a9685fd23254b19d8d64c36b
-
SSDEEP
6144:zIHYsZbS31zXqSNQgeiOKnDYVH0pwpMWEmpRBJ1NuUBY+f7zAF11whggaoHofphB:zIVZel6SOgeiOKEVH0ppWfBJ7XBczmRS
Malware Config
Signatures
-
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral2/memory/1156-5-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral2/memory/1156-7-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral2/memory/1156-9-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral2/memory/1156-10-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral2/memory/4236-22-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral2/memory/4236-26-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral2/memory/4236-24-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral2/memory/4236-28-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral2/memory/4236-30-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral2/memory/1156-31-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral2/memory/1156-33-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 4236 svchest425075242507520.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\192eb3093e6d5ae995718c2efe6251cf.exe" 192eb3093e6d5ae995718c2efe6251cf.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 192eb3093e6d5ae995718c2efe6251cf.exe File opened for modification \??\c:\Windows\BJ.exe 192eb3093e6d5ae995718c2efe6251cf.exe File created \??\c:\Windows\svchest425075242507520.exe 192eb3093e6d5ae995718c2efe6251cf.exe File opened for modification \??\c:\Windows\svchest425075242507520.exe 192eb3093e6d5ae995718c2efe6251cf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1156 wrote to memory of 4236 1156 192eb3093e6d5ae995718c2efe6251cf.exe 91 PID 1156 wrote to memory of 4236 1156 192eb3093e6d5ae995718c2efe6251cf.exe 91 PID 1156 wrote to memory of 4236 1156 192eb3093e6d5ae995718c2efe6251cf.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\192eb3093e6d5ae995718c2efe6251cf.exe"C:\Users\Admin\AppData\Local\Temp\192eb3093e6d5ae995718c2efe6251cf.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1156 -
\??\c:\Windows\svchest425075242507520.exec:\Windows\svchest425075242507520.exe2⤵
- Executes dropped EXE
PID:4236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD50a27db1325280b37243f7e1390df5703
SHA1e47d46774c3c09a64bc4d77b415fa193dd72d5cd
SHA256e256677642926c3cef2e9152b9fd36e891b96f9202337254a853b5a04212b6a9
SHA51254ed926b552a8b541a1ec8e8e6d8e9ad0b675faff6f0e0b3a412a90291602aa1c94cf8bd0c3e0b0ee007e29445049d375546c2b2cc23bb2a635df30f56d6994e
-
Filesize
63KB
MD50d20b33efed7931894318ccd41225a7f
SHA156c2c19d59f2da4922baa9b44f0d90356f931cd4
SHA2567156f6743304817bc64bd937ecc6a7aed939ec6586f7aa197dcf32486714f118
SHA5123a420c1985e8b2cc0cd7ad2bef42514fafe23fcb15b9ea37446052e21dbff85379598f91b7e9062237b59dc2256f1686e1d5912da38b20b863bb512cdd9b1a13
-
Filesize
119KB
MD576a1eaeea1996222de20a876aa9277c2
SHA1c469a375bddcee7fc45420481826e9b7768408ab
SHA2567ae02509ae55f44f7eb347f5d9e522bd02d05dcf9bf095ffa97928bbd6ce9ab3
SHA512629d1ef35b6807523ed2c0edbfbd5712b4dc30b3166675134031e569ed4697f289dcbbda16aab4df4982685b826889e8280cf64d5815371d8c52925f405b6961