Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 23:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
20632e3f3c17863bc3f6d7649e738c5d.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
20632e3f3c17863bc3f6d7649e738c5d.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
20632e3f3c17863bc3f6d7649e738c5d.exe
-
Size
382KB
-
MD5
20632e3f3c17863bc3f6d7649e738c5d
-
SHA1
a54f37f084078bf8cc3556bd3a1f112e0cebe78c
-
SHA256
c9a95f7f47b3eae61b7e69aaca8b371307ff3f500f5fdec142480c0a3a917638
-
SHA512
9294a06617237b26fb8c0f50173099bf387e8bfdcb065ee01dcbd28323eb9780a76ad0e75f78d1845f23e462d3cb77f554e1c3dee879291aa4288f2bb5072a1a
-
SSDEEP
6144:v9QdThQbbQhzfytCnF2idZecnl20lHRxp3glWmhEgRV8Bl7Md8tHoCO+bP1cFBWT:1ETWyzatCFF3Z4mxxyD0hxg+bPCBh0
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1264-37-0x0000000000400000-0x0000000000470000-memory.dmp family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility32.dll" 20632e3f3c17863bc3f6d7649e738c5d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20632e3f3c17863bc3f6d7649e738c5d.exe"C:\Users\Admin\AppData\Local\Temp\20632e3f3c17863bc3f6d7649e738c5d.exe"1⤵
- Sets DLL path for service in the registry
PID:1264
-
C:\Windows\System32\svchost.exeC:\Windows\\System32\\svchost.exe -k netsvcs1⤵PID:2436