Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:59
Behavioral task
behavioral1
Sample
226b5275911dc1fd39a97be3d5f8004c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
226b5275911dc1fd39a97be3d5f8004c.exe
Resource
win10v2004-20231215-en
General
-
Target
226b5275911dc1fd39a97be3d5f8004c.exe
-
Size
878KB
-
MD5
226b5275911dc1fd39a97be3d5f8004c
-
SHA1
1a55b684bdf20a62a5cf42e1a6f14280966d2584
-
SHA256
c2b9de39a0f0a463772d2c879fb4a2b8d1b0575212424a896eb06bbf7906a9ee
-
SHA512
b66832c7d198d3532e7c7d6cdb25a50b6fcc27fc2b41aa70e731f73276b53ebfb09826f55098ad06222b8439269f9b4b4661664519ab0105e0b5745006284942
-
SSDEEP
12288:/M5REAfL3aKHx5r+TuxXzNWJBhiFHzsVK2oAuD:/M5RE23aKHx5r+TuxXzcBsFHUoAuD
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0006000000023244-8.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 4016 svchest432011243201120.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 226b5275911dc1fd39a97be3d5f8004c.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 226b5275911dc1fd39a97be3d5f8004c.exe File opened for modification \??\c:\Windows\BJ.exe 226b5275911dc1fd39a97be3d5f8004c.exe File created \??\c:\Windows\svchest432011243201120.exe 226b5275911dc1fd39a97be3d5f8004c.exe File created \??\c:\Windows\notepab.exe 226b5275911dc1fd39a97be3d5f8004c.exe File opened for modification \??\c:\Windows\svchest432011243201120.exe 226b5275911dc1fd39a97be3d5f8004c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4440 wrote to memory of 4016 4440 226b5275911dc1fd39a97be3d5f8004c.exe 92 PID 4440 wrote to memory of 4016 4440 226b5275911dc1fd39a97be3d5f8004c.exe 92 PID 4440 wrote to memory of 4016 4440 226b5275911dc1fd39a97be3d5f8004c.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\226b5275911dc1fd39a97be3d5f8004c.exe"C:\Users\Admin\AppData\Local\Temp\226b5275911dc1fd39a97be3d5f8004c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4440 -
\??\c:\Windows\svchest432011243201120.exec:\Windows\svchest432011243201120.exe2⤵
- Executes dropped EXE
PID:4016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
878KB
MD5226b5275911dc1fd39a97be3d5f8004c
SHA11a55b684bdf20a62a5cf42e1a6f14280966d2584
SHA256c2b9de39a0f0a463772d2c879fb4a2b8d1b0575212424a896eb06bbf7906a9ee
SHA512b66832c7d198d3532e7c7d6cdb25a50b6fcc27fc2b41aa70e731f73276b53ebfb09826f55098ad06222b8439269f9b4b4661664519ab0105e0b5745006284942