Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 02:33
Behavioral task
behavioral1
Sample
4ce00127b185f89f2f48759233f442c2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ce00127b185f89f2f48759233f442c2.exe
Resource
win10v2004-20231215-en
General
-
Target
4ce00127b185f89f2f48759233f442c2.exe
-
Size
833KB
-
MD5
4ce00127b185f89f2f48759233f442c2
-
SHA1
10b2a773f9754b2a5bf1376ead93fc9dcaf2210b
-
SHA256
a0bb7e4808b6bfb6b07d24207536cf586f8a20919bce0690752a5eacc9bff494
-
SHA512
cebdb1ef7e260066b5159fadf8cea5ccb8d17f4fd474ed675eeb7d86c1c237ab614ed93312e7c6cb5bcc207b7a097e07a6bc05bfe0e5ac7ed22e17ff0221c060
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZEF:iM5j8Z3aKHx5r+TuxX+IwffFZEF
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000b000000023166-4.dat family_gh0strat behavioral2/files/0x000b000000023166-5.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 220 svchest432048043204801465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 4ce00127b185f89f2f48759233f442c2.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 4ce00127b185f89f2f48759233f442c2.exe File created \??\c:\Windows\svchest432048043204801465662051.exe 4ce00127b185f89f2f48759233f442c2.exe File opened for modification \??\c:\Windows\svchest432048043204801465662051.exe 4ce00127b185f89f2f48759233f442c2.exe File created \??\c:\Windows\notepab.exe 4ce00127b185f89f2f48759233f442c2.exe File opened for modification \??\c:\Windows\BJ.exe 4ce00127b185f89f2f48759233f442c2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 728 wrote to memory of 220 728 4ce00127b185f89f2f48759233f442c2.exe 19 PID 728 wrote to memory of 220 728 4ce00127b185f89f2f48759233f442c2.exe 19 PID 728 wrote to memory of 220 728 4ce00127b185f89f2f48759233f442c2.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ce00127b185f89f2f48759233f442c2.exe"C:\Users\Admin\AppData\Local\Temp\4ce00127b185f89f2f48759233f442c2.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:728 -
\??\c:\Windows\svchest432048043204801465662051.exec:\Windows\svchest432048043204801465662051.exe2⤵
- Executes dropped EXE
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD53f29da322e73129f5bfa8d3ec48c790b
SHA1519045b61cf9a8ea876bdf0d5234f39610de1889
SHA256f5b33a540edbba595a8f5479c82af9fb47d930d03fb7a6781d2c461b517818f8
SHA512a239477ba67e0c931cf3e0d77d6d515d1570efdb2879eba1a6459a8884b3b663edf9ef8f761ffd37cee21404eb4ecff165b9863b7934870d21290c761b0a3746
-
Filesize
348KB
MD52205ada1a9286c407bf1234102b195a6
SHA1404ad7a6ac932afc01430bc2d43f736178148116
SHA2564e992a8eb45b90f122c7d35cd08632d34c0bf69de1c2797f8ea8a8c92fdf8328
SHA5123bc78cbc9489031a0580602c928e2a10d56e3f900efdc26b30b3f3a70662aa7bd8ceb8da38e4a6fddd63342b9d5b04799d4fa4d13fe95736ba2cfe43c100adf9