Analysis
-
max time kernel
162s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:09
Behavioral task
behavioral1
Sample
296a42fef32dcaaf2098ee66b8b00356.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
296a42fef32dcaaf2098ee66b8b00356.exe
Resource
win10v2004-20231215-en
General
-
Target
296a42fef32dcaaf2098ee66b8b00356.exe
-
Size
666KB
-
MD5
296a42fef32dcaaf2098ee66b8b00356
-
SHA1
50e4b6b021bb241ee6e0ac7781a4ca8886c3cf89
-
SHA256
eae1eb28d8b4ee8c7b658e22aa688a56716ee30c6d2957ce0f6fc2eb18836204
-
SHA512
38c255c288218ccf14d00a1d4ecf3122e03849fbdf096d3da7633337a6304eaa36b1358878f0a03ce75a90e1b6b535f7bc820a81a07412e3cc0f08447620738b
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZNr:iM5j8Z3aKHx5r+TuxX+IwffFZNr
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023024-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 684 svchest432048043204801465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 296a42fef32dcaaf2098ee66b8b00356.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 296a42fef32dcaaf2098ee66b8b00356.exe File opened for modification \??\c:\Windows\BJ.exe 296a42fef32dcaaf2098ee66b8b00356.exe File created \??\c:\Windows\svchest432048043204801465662051.exe 296a42fef32dcaaf2098ee66b8b00356.exe File opened for modification \??\c:\Windows\svchest432048043204801465662051.exe 296a42fef32dcaaf2098ee66b8b00356.exe File created \??\c:\Windows\notepab.exe 296a42fef32dcaaf2098ee66b8b00356.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3856 wrote to memory of 684 3856 296a42fef32dcaaf2098ee66b8b00356.exe 90 PID 3856 wrote to memory of 684 3856 296a42fef32dcaaf2098ee66b8b00356.exe 90 PID 3856 wrote to memory of 684 3856 296a42fef32dcaaf2098ee66b8b00356.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\296a42fef32dcaaf2098ee66b8b00356.exe"C:\Users\Admin\AppData\Local\Temp\296a42fef32dcaaf2098ee66b8b00356.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3856 -
\??\c:\Windows\svchest432048043204801465662051.exec:\Windows\svchest432048043204801465662051.exe2⤵
- Executes dropped EXE
PID:684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
666KB
MD5296a42fef32dcaaf2098ee66b8b00356
SHA150e4b6b021bb241ee6e0ac7781a4ca8886c3cf89
SHA256eae1eb28d8b4ee8c7b658e22aa688a56716ee30c6d2957ce0f6fc2eb18836204
SHA51238c255c288218ccf14d00a1d4ecf3122e03849fbdf096d3da7633337a6304eaa36b1358878f0a03ce75a90e1b6b535f7bc820a81a07412e3cc0f08447620738b