Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1f6270ab18526853ce75129d9d20f8d3.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1f6270ab18526853ce75129d9d20f8d3.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
1f6270ab18526853ce75129d9d20f8d3.exe
-
Size
220KB
-
MD5
1f6270ab18526853ce75129d9d20f8d3
-
SHA1
61a8096c011090d9fdf154593595e24d80ff67e0
-
SHA256
3a21223ba3e04505352d5f0f06debe819e455608071a5478e776309d3406bf49
-
SHA512
bdb4a687b2dd9f85b5e81f66c4321accb2fc84856ade05252b2dd824d320f43aa66ab155b88e63afc041c9e88b48f0df039139e9102ed4f39b5b23168ec6ed62
-
SSDEEP
6144:SiTkuXYzbmded9vZaYqqJlKi+go87pNjCNb:WgabHnUls+gdpNjC1
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1072-5-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/1072-10-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/1072-7-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXDD519F38 = "C:\\Windows\\XXXXXXDD519F38\\svchsot.exe" 1f6270ab18526853ce75129d9d20f8d3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\XXXXXXDD519F38\svchsot.exe 1f6270ab18526853ce75129d9d20f8d3.exe File created C:\Windows\XXXXXXDD519F38\svchsot.exe 1f6270ab18526853ce75129d9d20f8d3.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1072 1f6270ab18526853ce75129d9d20f8d3.exe 1072 1f6270ab18526853ce75129d9d20f8d3.exe 1072 1f6270ab18526853ce75129d9d20f8d3.exe