Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 15:02
Behavioral task
behavioral1
Sample
77ab30a7741249eb4f8030e5dde5827f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77ab30a7741249eb4f8030e5dde5827f.exe
Resource
win10v2004-20231215-en
General
-
Target
77ab30a7741249eb4f8030e5dde5827f.exe
-
Size
819KB
-
MD5
77ab30a7741249eb4f8030e5dde5827f
-
SHA1
2996a29ea2a246072180c5f5335e8b8468fd8906
-
SHA256
ecc42f71ba626454eaf74b4c170c34c82427c4f9e988d8e8a5483460801bea4f
-
SHA512
b132d8d6c5b6223c45f4e57d47140b95759120eeb8afb0f4ea1043aed884571866099082a8e34f70e9c06ccd04b83d1b8495dc3c5cb9a4376e02a18097b0ebe9
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZbl:iM5j8Z3aKHx5r+TuxX+IwffFZbl
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023207-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 3996 svchest432048043204801465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 77ab30a7741249eb4f8030e5dde5827f.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\svchest432048043204801465662051.exe 77ab30a7741249eb4f8030e5dde5827f.exe File opened for modification \??\c:\Windows\svchest432048043204801465662051.exe 77ab30a7741249eb4f8030e5dde5827f.exe File created \??\c:\Windows\notepab.exe 77ab30a7741249eb4f8030e5dde5827f.exe File created \??\c:\Windows\BJ.exe 77ab30a7741249eb4f8030e5dde5827f.exe File opened for modification \??\c:\Windows\BJ.exe 77ab30a7741249eb4f8030e5dde5827f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2768 wrote to memory of 3996 2768 77ab30a7741249eb4f8030e5dde5827f.exe 86 PID 2768 wrote to memory of 3996 2768 77ab30a7741249eb4f8030e5dde5827f.exe 86 PID 2768 wrote to memory of 3996 2768 77ab30a7741249eb4f8030e5dde5827f.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\77ab30a7741249eb4f8030e5dde5827f.exe"C:\Users\Admin\AppData\Local\Temp\77ab30a7741249eb4f8030e5dde5827f.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\Windows\svchest432048043204801465662051.exec:\Windows\svchest432048043204801465662051.exe2⤵
- Executes dropped EXE
PID:3996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
819KB
MD577ab30a7741249eb4f8030e5dde5827f
SHA12996a29ea2a246072180c5f5335e8b8468fd8906
SHA256ecc42f71ba626454eaf74b4c170c34c82427c4f9e988d8e8a5483460801bea4f
SHA512b132d8d6c5b6223c45f4e57d47140b95759120eeb8afb0f4ea1043aed884571866099082a8e34f70e9c06ccd04b83d1b8495dc3c5cb9a4376e02a18097b0ebe9