Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:51
Behavioral task
behavioral1
Sample
06242bfbc0e628aa610cc73511bf904f.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
06242bfbc0e628aa610cc73511bf904f.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
06242bfbc0e628aa610cc73511bf904f.exe
-
Size
983KB
-
MD5
06242bfbc0e628aa610cc73511bf904f
-
SHA1
abbc57ae0d4f6af32e20c0ce937c50e5f8928b77
-
SHA256
66d43cc10e783a2740852dbe6a543fe645785efd2cda07aa4a7a542106fba51d
-
SHA512
c2b29bed37e41557008c6439713ea16c991ff6dabf44f9a83043d30f40168ac4c95a26a59577f64143737f6eda089eca35ead046e6463085a0abc1d37f67a9d6
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZFVR:iM5j8Z3aKHx5r+TuxX+IwffFZFVR
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000d00000002315a-5.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 4184 svchest432048043204801465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 06242bfbc0e628aa610cc73511bf904f.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\Windows\svchest432048043204801465662051.exe 06242bfbc0e628aa610cc73511bf904f.exe File created \??\c:\Windows\notepab.exe 06242bfbc0e628aa610cc73511bf904f.exe File opened for modification \??\c:\Windows\BJ.exe 06242bfbc0e628aa610cc73511bf904f.exe File created \??\c:\Windows\BJ.exe 06242bfbc0e628aa610cc73511bf904f.exe File created \??\c:\Windows\svchest432048043204801465662051.exe 06242bfbc0e628aa610cc73511bf904f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4736 wrote to memory of 4184 4736 06242bfbc0e628aa610cc73511bf904f.exe 23 PID 4736 wrote to memory of 4184 4736 06242bfbc0e628aa610cc73511bf904f.exe 23 PID 4736 wrote to memory of 4184 4736 06242bfbc0e628aa610cc73511bf904f.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\06242bfbc0e628aa610cc73511bf904f.exe"C:\Users\Admin\AppData\Local\Temp\06242bfbc0e628aa610cc73511bf904f.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4736 -
\??\c:\Windows\svchest432048043204801465662051.exec:\Windows\svchest432048043204801465662051.exe2⤵
- Executes dropped EXE
PID:4184
-