Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
67e7ba4551b756a93b708385d9000914.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67e7ba4551b756a93b708385d9000914.exe
Resource
win10v2004-20231222-en
General
-
Target
67e7ba4551b756a93b708385d9000914.exe
-
Size
94KB
-
MD5
67e7ba4551b756a93b708385d9000914
-
SHA1
4debf63126441ecbd697d817e0ae1b71329623e0
-
SHA256
9025f6bdcc27393d2903be3e773672d33cfc841e1034031acbaa6cb5954bef7f
-
SHA512
0b5aa8892ce674d5d6938f8c31bb435ba0f249cbdbb0099c7e86051681792007adf992d945a0f03a5e954c604f715069788d1a974f678308ad292f88c8753413
-
SSDEEP
1536:IAmK0EeQ+0AEdKTMzsYXLyk2WpFpJVGHr99kfICINpwv0i0RW1eAY49sRYGwPXST:sDEj+0yTMJn2W8kxvVCUicTwrh
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000e000000012301-3.dat family_gh0strat behavioral1/memory/1984-5-0x0000000000160000-0x000000000017C000-memory.dmp family_gh0strat behavioral1/memory/2144-9-0x0000000000400000-0x000000000041BDE0-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2144 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 1984 67e7ba4551b756a93b708385d9000914.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 67e7ba4551b756a93b708385d9000914.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2144 1984 67e7ba4551b756a93b708385d9000914.exe 28 PID 1984 wrote to memory of 2144 1984 67e7ba4551b756a93b708385d9000914.exe 28 PID 1984 wrote to memory of 2144 1984 67e7ba4551b756a93b708385d9000914.exe 28 PID 1984 wrote to memory of 2144 1984 67e7ba4551b756a93b708385d9000914.exe 28 PID 1984 wrote to memory of 2144 1984 67e7ba4551b756a93b708385d9000914.exe 28 PID 1984 wrote to memory of 2144 1984 67e7ba4551b756a93b708385d9000914.exe 28 PID 1984 wrote to memory of 2144 1984 67e7ba4551b756a93b708385d9000914.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\67e7ba4551b756a93b708385d9000914.exe"C:\Users\Admin\AppData\Local\Temp\67e7ba4551b756a93b708385d9000914.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe2⤵
- Executes dropped EXE
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD504b178f1e3ffbdb8dae226d363c479af
SHA14f5164b125777a5b2a5095bf7fa7416df75575c6
SHA2560a59eb5329b9f3afee8743dab4dbb3f56ad9b30975fcfe55c46eacad93c99d13
SHA512a305c4e517d28c2d07a4d6679529a9b263368349caaf7a834ac249bc04323087427382b3c15b418d490f6b0aac6573aa3dde4609fac793cc8e0051c387705caf