Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 19:42
Behavioral task
behavioral1
Sample
3ae371fbd25b2c9cac0113225b423518.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3ae371fbd25b2c9cac0113225b423518.exe
Resource
win10v2004-20231215-en
General
-
Target
3ae371fbd25b2c9cac0113225b423518.exe
-
Size
636KB
-
MD5
3ae371fbd25b2c9cac0113225b423518
-
SHA1
5c2c8503f3ab0baf69a68e3d732c31f02dc8f1ab
-
SHA256
50d1e6f40ec1c0d3b28b4c91a34a5c8c9d4b6166b17c7280b7fa1781675ee0a3
-
SHA512
836164cfd5c64ecf4a8bbb525961dc71e6b06c74cac2c49f2b016674ce3f48ad6c28c089a122fea0374892e8d153598d0eb8fd4d749817889d7b3d0b8443a799
-
SSDEEP
12288:m/eC0vZVQQxfnr+TK7r79/JenWAG36ATphjM5Bfc:m/XwVQQxfnr+TK7r79/Je3GqArjM5Bfc
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000002320c-6.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2432 svchest425112042511200.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 3ae371fbd25b2c9cac0113225b423518.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\Windows\BJ.exe 3ae371fbd25b2c9cac0113225b423518.exe File created \??\c:\Windows\BJ.exe 3ae371fbd25b2c9cac0113225b423518.exe File created \??\c:\Windows\svchest425112042511200.exe 3ae371fbd25b2c9cac0113225b423518.exe File opened for modification \??\c:\Windows\svchest425112042511200.exe 3ae371fbd25b2c9cac0113225b423518.exe File created \??\c:\Windows\notepab.exe 3ae371fbd25b2c9cac0113225b423518.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4608 wrote to memory of 2432 4608 3ae371fbd25b2c9cac0113225b423518.exe 87 PID 4608 wrote to memory of 2432 4608 3ae371fbd25b2c9cac0113225b423518.exe 87 PID 4608 wrote to memory of 2432 4608 3ae371fbd25b2c9cac0113225b423518.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ae371fbd25b2c9cac0113225b423518.exe"C:\Users\Admin\AppData\Local\Temp\3ae371fbd25b2c9cac0113225b423518.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4608 -
\??\c:\Windows\svchest425112042511200.exec:\Windows\svchest425112042511200.exe2⤵
- Executes dropped EXE
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD53ae371fbd25b2c9cac0113225b423518
SHA15c2c8503f3ab0baf69a68e3d732c31f02dc8f1ab
SHA25650d1e6f40ec1c0d3b28b4c91a34a5c8c9d4b6166b17c7280b7fa1781675ee0a3
SHA512836164cfd5c64ecf4a8bbb525961dc71e6b06c74cac2c49f2b016674ce3f48ad6c28c089a122fea0374892e8d153598d0eb8fd4d749817889d7b3d0b8443a799