Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 09:36
Behavioral task
behavioral1
Sample
14a7a1f22e7c7c6adac419e6629316bd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14a7a1f22e7c7c6adac419e6629316bd.exe
Resource
win10v2004-20231215-en
General
-
Target
14a7a1f22e7c7c6adac419e6629316bd.exe
-
Size
933KB
-
MD5
14a7a1f22e7c7c6adac419e6629316bd
-
SHA1
9f5692144e061cac945fa1cbec37455aa9ecbd4f
-
SHA256
41fce348a18427cb5c9fe1944e1e180b3eeaa4583ab62f888d5110d488c8939b
-
SHA512
9563b506c457e7d5d70769b86d5492743c559d78e0a08f716def0bec0ecd032c57767d9c6a85dcaa01496bebb8cc634153380cf4f1fa6c2179d9c8e540dcd651
-
SSDEEP
12288:jt0VPFfsKAkrbPlXhHANUTNqm0HANUTN8JZ:SFksb1AmTJZ
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2940-12-0x0000000000400000-0x00000000004F1000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2940 (null)0.exe -
resource yara_rule behavioral1/memory/1988-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/files/0x000900000001225c-5.dat upx behavioral1/memory/1988-6-0x0000000002600000-0x00000000026F1000-memory.dmp upx behavioral1/memory/2940-11-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/memory/2940-12-0x0000000000400000-0x00000000004F1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\14a7a1f22e7c7c6adac419e6629316bd.exe" 14a7a1f22e7c7c6adac419e6629316bd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created \??\c:\Windows\(null)0.exe 14a7a1f22e7c7c6adac419e6629316bd.exe File created \??\c:\Windows\BJ.exe 14a7a1f22e7c7c6adac419e6629316bd.exe File opened for modification \??\c:\Windows\BJ.exe 14a7a1f22e7c7c6adac419e6629316bd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2940 1988 14a7a1f22e7c7c6adac419e6629316bd.exe 28 PID 1988 wrote to memory of 2940 1988 14a7a1f22e7c7c6adac419e6629316bd.exe 28 PID 1988 wrote to memory of 2940 1988 14a7a1f22e7c7c6adac419e6629316bd.exe 28 PID 1988 wrote to memory of 2940 1988 14a7a1f22e7c7c6adac419e6629316bd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\14a7a1f22e7c7c6adac419e6629316bd.exe"C:\Users\Admin\AppData\Local\Temp\14a7a1f22e7c7c6adac419e6629316bd.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1988 -
\??\c:\Windows\(null)0.exec:\Windows\(null)0.exe2⤵
- Executes dropped EXE
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD514a7a1f22e7c7c6adac419e6629316bd
SHA19f5692144e061cac945fa1cbec37455aa9ecbd4f
SHA25641fce348a18427cb5c9fe1944e1e180b3eeaa4583ab62f888d5110d488c8939b
SHA5129563b506c457e7d5d70769b86d5492743c559d78e0a08f716def0bec0ecd032c57767d9c6a85dcaa01496bebb8cc634153380cf4f1fa6c2179d9c8e540dcd651