Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fa8ad5b2bf80a8ce86945a77f1c503ab.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
fa8ad5b2bf80a8ce86945a77f1c503ab.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
fa8ad5b2bf80a8ce86945a77f1c503ab.exe
-
Size
204KB
-
MD5
fa8ad5b2bf80a8ce86945a77f1c503ab
-
SHA1
7caa868b3f3547ecd375f6bede6e08c3c52caaaa
-
SHA256
52d2d10fb98af154436010d33e2425de91932c4ba1a0f73e43a35f3e2e97aa86
-
SHA512
a5787fcd60b2ada32f741d75b6c12e5e3e183edc45bd9f71293ce86797d60a105f4c77f39c96a2c2fc25ef66cc2845b41fefa9d9c46fbbc265b1d1dac8ec7eb5
-
SSDEEP
6144:Z6296wgvRHCzOYtqlGyzcsX3KA0LQIQRhHQz:so3gNCpOdn/uys
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2888-4-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/2888-1-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX9FEBFE10 = "C:\\Windows\\XXXXXX9FEBFE10\\svchsot.exe" fa8ad5b2bf80a8ce86945a77f1c503ab.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\XXXXXX9FEBFE10\svchsot.exe fa8ad5b2bf80a8ce86945a77f1c503ab.exe File created C:\Windows\XXXXXX9FEBFE10\svchsot.exe fa8ad5b2bf80a8ce86945a77f1c503ab.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2888 fa8ad5b2bf80a8ce86945a77f1c503ab.exe 2888 fa8ad5b2bf80a8ce86945a77f1c503ab.exe 2888 fa8ad5b2bf80a8ce86945a77f1c503ab.exe