Analysis
-
max time kernel
185s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 05:42
Behavioral task
behavioral1
Sample
2a6f1aefbef5007e990364f6e9723704.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a6f1aefbef5007e990364f6e9723704.exe
Resource
win10v2004-20231215-en
General
-
Target
2a6f1aefbef5007e990364f6e9723704.exe
-
Size
784KB
-
MD5
2a6f1aefbef5007e990364f6e9723704
-
SHA1
8f29bb3e321abb99b05cabd8ec34dcc9bad8ce98
-
SHA256
7eb307e749e0493cad075443aa0b8da61bb41e58bd83851b3a1e70993bdf2db1
-
SHA512
eb0898291afeec3a2bd5255e583e5a135d46d5af8b73e33410cc4efdc29453c865c804c98b11e369b847cc58c0522ffa26105af5a7cd7c9b54adb8a788811de8
-
SSDEEP
12288:jt0VPFfsKAkrbPlXhHANUTNqmkgHANUTNB:SFksb1Amks
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2712-11-0x0000000000400000-0x00000000004F1000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2712 (null)0.exe -
resource yara_rule behavioral1/memory/2876-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/files/0x00250000000146b5-5.dat upx behavioral1/memory/2712-11-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/files/0x00250000000146b5-8.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2a6f1aefbef5007e990364f6e9723704.exe" 2a6f1aefbef5007e990364f6e9723704.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\Windows\BJ.exe 2a6f1aefbef5007e990364f6e9723704.exe File created \??\c:\Windows\BJ.exe 2a6f1aefbef5007e990364f6e9723704.exe File created \??\c:\Windows\(null)0.exe 2a6f1aefbef5007e990364f6e9723704.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2712 2876 2a6f1aefbef5007e990364f6e9723704.exe 27 PID 2876 wrote to memory of 2712 2876 2a6f1aefbef5007e990364f6e9723704.exe 27 PID 2876 wrote to memory of 2712 2876 2a6f1aefbef5007e990364f6e9723704.exe 27 PID 2876 wrote to memory of 2712 2876 2a6f1aefbef5007e990364f6e9723704.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a6f1aefbef5007e990364f6e9723704.exe"C:\Users\Admin\AppData\Local\Temp\2a6f1aefbef5007e990364f6e9723704.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\Windows\(null)0.exec:\Windows\(null)0.exe2⤵
- Executes dropped EXE
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD59b38dfc04cebb740300c5e7335ae536e
SHA1c64c72a824108f92387ca74f7e7622fa41ae75f4
SHA256140ea6c44e239d0163c02754bad2d3dec41fa12d6fe9f403d69a32a16133901f
SHA512dec4d4f08f70fa05b708704a14ed17864e14d461d2f0987d9c30b55f2de97ae065c2613646e0a7da04c6c295a9e6b4d9bb92e328bcfc1a2c3673a5fb25616cd3
-
Filesize
384KB
MD5b6efe48beb21a3d9d5c68d3ed3045ef8
SHA12b14c9375e82100f46448ee696367c3e8f3b0c0e
SHA2569b2de18dd901c72baaf9d13958c8c7e95489cc0c888f4a872bb82d8b65918268
SHA512d24debba2455df914a8c881df25555cbd13ac8e88e6793690a1ab349d6331ce5428f99e6a0621d95014e71f79ac7ea1a38f1d532ad8d988212dbb5d7698226a2