Analysis
-
max time kernel
161s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:42
Behavioral task
behavioral1
Sample
551497f287097056600c4d26093fd09e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
551497f287097056600c4d26093fd09e.exe
Resource
win10v2004-20231215-en
General
-
Target
551497f287097056600c4d26093fd09e.exe
-
Size
868KB
-
MD5
551497f287097056600c4d26093fd09e
-
SHA1
0cc93bfef392dbe7a1ebb20be7be6938e5468f27
-
SHA256
e19b1aa8362b63d6edc2eecb697e52445fdc31b9c8d84d5803cf7a89a1037a68
-
SHA512
494fa525081783377fb86a1c5158d156aeebf3901565ed146d093adb00a20ee69acf31ec14b96aadbc777dd6f492f077617ae9fca792825b1e3e5069051305f8
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZKrG:iM5j8Z3aKHx5r+TuxX+IwffFZKrG
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x001500000001468c-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2744 svchest001465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 551497f287097056600c4d26093fd09e.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\notepab.exe 551497f287097056600c4d26093fd09e.exe File opened for modification \??\c:\Windows\BJ.exe 551497f287097056600c4d26093fd09e.exe File created \??\c:\Windows\BJ.exe 551497f287097056600c4d26093fd09e.exe File created \??\c:\Windows\svchest001465662051.exe 551497f287097056600c4d26093fd09e.exe File opened for modification \??\c:\Windows\svchest001465662051.exe 551497f287097056600c4d26093fd09e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2744 2928 551497f287097056600c4d26093fd09e.exe 27 PID 2928 wrote to memory of 2744 2928 551497f287097056600c4d26093fd09e.exe 27 PID 2928 wrote to memory of 2744 2928 551497f287097056600c4d26093fd09e.exe 27 PID 2928 wrote to memory of 2744 2928 551497f287097056600c4d26093fd09e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\551497f287097056600c4d26093fd09e.exe"C:\Users\Admin\AppData\Local\Temp\551497f287097056600c4d26093fd09e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\Windows\svchest001465662051.exec:\Windows\svchest001465662051.exe2⤵
- Executes dropped EXE
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
868KB
MD5551497f287097056600c4d26093fd09e
SHA10cc93bfef392dbe7a1ebb20be7be6938e5468f27
SHA256e19b1aa8362b63d6edc2eecb697e52445fdc31b9c8d84d5803cf7a89a1037a68
SHA512494fa525081783377fb86a1c5158d156aeebf3901565ed146d093adb00a20ee69acf31ec14b96aadbc777dd6f492f077617ae9fca792825b1e3e5069051305f8