Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 02:33
Behavioral task
behavioral1
Sample
4ce00127b185f89f2f48759233f442c2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ce00127b185f89f2f48759233f442c2.exe
Resource
win10v2004-20231215-en
General
-
Target
4ce00127b185f89f2f48759233f442c2.exe
-
Size
833KB
-
MD5
4ce00127b185f89f2f48759233f442c2
-
SHA1
10b2a773f9754b2a5bf1376ead93fc9dcaf2210b
-
SHA256
a0bb7e4808b6bfb6b07d24207536cf586f8a20919bce0690752a5eacc9bff494
-
SHA512
cebdb1ef7e260066b5159fadf8cea5ccb8d17f4fd474ed675eeb7d86c1c237ab614ed93312e7c6cb5bcc207b7a097e07a6bc05bfe0e5ac7ed22e17ff0221c060
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZEF:iM5j8Z3aKHx5r+TuxX+IwffFZEF
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012251-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2436 svchest001465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 4ce00127b185f89f2f48759233f442c2.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\Windows\svchest001465662051.exe 4ce00127b185f89f2f48759233f442c2.exe File created \??\c:\Windows\notepab.exe 4ce00127b185f89f2f48759233f442c2.exe File created \??\c:\Windows\BJ.exe 4ce00127b185f89f2f48759233f442c2.exe File opened for modification \??\c:\Windows\BJ.exe 4ce00127b185f89f2f48759233f442c2.exe File created \??\c:\Windows\svchest001465662051.exe 4ce00127b185f89f2f48759233f442c2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2436 2536 4ce00127b185f89f2f48759233f442c2.exe 28 PID 2536 wrote to memory of 2436 2536 4ce00127b185f89f2f48759233f442c2.exe 28 PID 2536 wrote to memory of 2436 2536 4ce00127b185f89f2f48759233f442c2.exe 28 PID 2536 wrote to memory of 2436 2536 4ce00127b185f89f2f48759233f442c2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ce00127b185f89f2f48759233f442c2.exe"C:\Users\Admin\AppData\Local\Temp\4ce00127b185f89f2f48759233f442c2.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\Windows\svchest001465662051.exec:\Windows\svchest001465662051.exe2⤵
- Executes dropped EXE
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
833KB
MD54ce00127b185f89f2f48759233f442c2
SHA110b2a773f9754b2a5bf1376ead93fc9dcaf2210b
SHA256a0bb7e4808b6bfb6b07d24207536cf586f8a20919bce0690752a5eacc9bff494
SHA512cebdb1ef7e260066b5159fadf8cea5ccb8d17f4fd474ed675eeb7d86c1c237ab614ed93312e7c6cb5bcc207b7a097e07a6bc05bfe0e5ac7ed22e17ff0221c060