Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:19
Behavioral task
behavioral1
Sample
261fe79bc4bc5ef853772473d4ddda1c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
261fe79bc4bc5ef853772473d4ddda1c.exe
Resource
win10v2004-20231222-en
General
-
Target
261fe79bc4bc5ef853772473d4ddda1c.exe
-
Size
842KB
-
MD5
261fe79bc4bc5ef853772473d4ddda1c
-
SHA1
2501eb1da797ab0a7b9d178e7494cd842de9cacf
-
SHA256
f152dc7b48e87ee9745914ab1c70a020c0862ed2c8972af865b32ebeaca8eeec
-
SHA512
9056a000af6b51d489d4e9db67192f841fd23579173cb186bc06da33c2a3cd04176b94fe4a9d01efff8ea7c82afb710105cda59bebd01a333653c79c3fcf4587
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZ1v33:iM5j8Z3aKHx5r+TuxX+IwffFZ1v33
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x000700000002320b-6.dat family_gh0strat behavioral2/files/0x000700000002320b-5.dat family_gh0strat behavioral2/files/0x000700000002320b-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 3232 svchest432048043204801465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 261fe79bc4bc5ef853772473d4ddda1c.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\Windows\BJ.exe 261fe79bc4bc5ef853772473d4ddda1c.exe File created \??\c:\Windows\BJ.exe 261fe79bc4bc5ef853772473d4ddda1c.exe File created \??\c:\Windows\svchest432048043204801465662051.exe 261fe79bc4bc5ef853772473d4ddda1c.exe File opened for modification \??\c:\Windows\svchest432048043204801465662051.exe 261fe79bc4bc5ef853772473d4ddda1c.exe File created \??\c:\Windows\notepab.exe 261fe79bc4bc5ef853772473d4ddda1c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1464 wrote to memory of 3232 1464 261fe79bc4bc5ef853772473d4ddda1c.exe 22 PID 1464 wrote to memory of 3232 1464 261fe79bc4bc5ef853772473d4ddda1c.exe 22 PID 1464 wrote to memory of 3232 1464 261fe79bc4bc5ef853772473d4ddda1c.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\261fe79bc4bc5ef853772473d4ddda1c.exe"C:\Users\Admin\AppData\Local\Temp\261fe79bc4bc5ef853772473d4ddda1c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1464 -
\??\c:\Windows\svchest432048043204801465662051.exec:\Windows\svchest432048043204801465662051.exe2⤵
- Executes dropped EXE
PID:3232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
842KB
MD5261fe79bc4bc5ef853772473d4ddda1c
SHA12501eb1da797ab0a7b9d178e7494cd842de9cacf
SHA256f152dc7b48e87ee9745914ab1c70a020c0862ed2c8972af865b32ebeaca8eeec
SHA5129056a000af6b51d489d4e9db67192f841fd23579173cb186bc06da33c2a3cd04176b94fe4a9d01efff8ea7c82afb710105cda59bebd01a333653c79c3fcf4587
-
Filesize
381KB
MD531ce6be297644b787329ba851c229e11
SHA170cdde02fa4375fea07c741f15b44831517143ff
SHA256087e2f124f7d4b835a32de103a63e67fd0b153f74f38083cb3092c99a3d4b70c
SHA51263c13b23bda8fa156dd7c1ca19a557a3170182e590edd7e5bfdcb17d5cf7b09f30e933d61034f875afab0b6ea5a5a39c4fe24f8be2a99cc927c4ef9a2980b58b
-
Filesize
382KB
MD52404361d97b6cfaa440bc4d90327421b
SHA125fa8f7576568f5197bdd330ff36386217fc670b
SHA256ebd984ffecf9bd635d8cdbfe43039531138ae4ee0824589d2b31a08f139c9bd9
SHA512ea257a3dfb9165a1cfb9469ada357984dfe2d4e54e49957eb30179efc64bf8bbad02e5eae95dceda4d82e509bd50169d3c3d5cfa48e501944ca7bfddbec2fa94