Analysis
-
max time kernel
187s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:19
Behavioral task
behavioral1
Sample
261fe79bc4bc5ef853772473d4ddda1c.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
261fe79bc4bc5ef853772473d4ddda1c.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
261fe79bc4bc5ef853772473d4ddda1c.exe
-
Size
842KB
-
MD5
261fe79bc4bc5ef853772473d4ddda1c
-
SHA1
2501eb1da797ab0a7b9d178e7494cd842de9cacf
-
SHA256
f152dc7b48e87ee9745914ab1c70a020c0862ed2c8972af865b32ebeaca8eeec
-
SHA512
9056a000af6b51d489d4e9db67192f841fd23579173cb186bc06da33c2a3cd04176b94fe4a9d01efff8ea7c82afb710105cda59bebd01a333653c79c3fcf4587
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZ1v33:iM5j8Z3aKHx5r+TuxX+IwffFZ1v33
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012266-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2308 svchest001465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 261fe79bc4bc5ef853772473d4ddda1c.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\svchest001465662051.exe 261fe79bc4bc5ef853772473d4ddda1c.exe File opened for modification \??\c:\Windows\svchest001465662051.exe 261fe79bc4bc5ef853772473d4ddda1c.exe File created \??\c:\Windows\notepab.exe 261fe79bc4bc5ef853772473d4ddda1c.exe File created \??\c:\Windows\BJ.exe 261fe79bc4bc5ef853772473d4ddda1c.exe File opened for modification \??\c:\Windows\BJ.exe 261fe79bc4bc5ef853772473d4ddda1c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2308 2740 261fe79bc4bc5ef853772473d4ddda1c.exe 28 PID 2740 wrote to memory of 2308 2740 261fe79bc4bc5ef853772473d4ddda1c.exe 28 PID 2740 wrote to memory of 2308 2740 261fe79bc4bc5ef853772473d4ddda1c.exe 28 PID 2740 wrote to memory of 2308 2740 261fe79bc4bc5ef853772473d4ddda1c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\261fe79bc4bc5ef853772473d4ddda1c.exe"C:\Users\Admin\AppData\Local\Temp\261fe79bc4bc5ef853772473d4ddda1c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\Windows\svchest001465662051.exec:\Windows\svchest001465662051.exe2⤵
- Executes dropped EXE
PID:2308
-