Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 02:32
Behavioral task
behavioral1
Sample
b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e.exe
Resource
win10v2004-20231215-en
General
-
Target
b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e.exe
-
Size
2.1MB
-
MD5
08f9669972bf8032a8fc606cc389cb99
-
SHA1
6b44cb1b32be04f132e78e199e9d616f3cad6338
-
SHA256
b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e
-
SHA512
1014b886d6e1caa3092399697a4aa0e9e1c0e37e246210b8534e1aec480d0327bad02ab932866b55fb7740c12a7a7c5755c88a23ff7a708abd1d6ca0779c6ef0
-
SSDEEP
3072:YyIpG2/iDbYACgYf+74wtCCVSIOObQ+ju8k+8R8iVt:9IposJghsgCCVbkz8iVt
Malware Config
Extracted
gh0strat
101.43.78.212
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/3012-1-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral1/memory/2204-14-0x0000000000400000-0x000000000046D000-memory.dmp family_gh0strat behavioral1/memory/2032-19-0x0000000000400000-0x000000000046D000-memory.dmp family_gh0strat behavioral1/memory/3012-20-0x0000000000400000-0x000000000046D000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2204 Qovrzmo.exe 2032 Qovrzmo.exe -
resource yara_rule behavioral1/memory/3012-0-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/files/0x000c000000015c85-7.dat upx behavioral1/memory/2204-8-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/files/0x000c000000015c85-12.dat upx behavioral1/memory/2204-14-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2032-15-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2032-19-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/3012-20-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Ooewom\Qovrzmo.exe b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e.exe File opened for modification C:\Program Files (x86)\Microsoft Ooewom\Qovrzmo.exe b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3012 b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e.exe 3012 b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e.exe 3012 b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e.exe 2204 Qovrzmo.exe 2204 Qovrzmo.exe 2204 Qovrzmo.exe 2032 Qovrzmo.exe 2032 Qovrzmo.exe 2032 Qovrzmo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2032 2204 Qovrzmo.exe 29 PID 2204 wrote to memory of 2032 2204 Qovrzmo.exe 29 PID 2204 wrote to memory of 2032 2204 Qovrzmo.exe 29 PID 2204 wrote to memory of 2032 2204 Qovrzmo.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e.exe"C:\Users\Admin\AppData\Local\Temp\b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
C:\Program Files (x86)\Microsoft Ooewom\Qovrzmo.exe"C:\Program Files (x86)\Microsoft Ooewom\Qovrzmo.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Microsoft Ooewom\Qovrzmo.exe"C:\Program Files (x86)\Microsoft Ooewom\Qovrzmo.exe" Win72⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD508f9669972bf8032a8fc606cc389cb99
SHA16b44cb1b32be04f132e78e199e9d616f3cad6338
SHA256b75b9b0e09e55b3d020a0e4d80ee1ed05c490f4024233f806243fa0768d45f1e
SHA5121014b886d6e1caa3092399697a4aa0e9e1c0e37e246210b8534e1aec480d0327bad02ab932866b55fb7740c12a7a7c5755c88a23ff7a708abd1d6ca0779c6ef0
-
Filesize
1.2MB
MD528de003ffb213cae51d7a60cf91fbb70
SHA1bbe92957de66e8e39e4652d1e9d9c778e70c8793
SHA256cd0c66292faea50d58cb6f484db935931f8b991dfabfe5d210a8dc5d63b40d1e
SHA5121645034957e67e8804f8e900c5602f33fdbab67c1c4b7a265efa7b3c464d706ea9f2a34517f47b8f1b808b83c2263d925498f2dc2dad07ffe2cccd0c6f9bd3f5