Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 04:05
Behavioral task
behavioral1
Sample
7c1a44bdd0a9900a33ea028748dfbe47.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c1a44bdd0a9900a33ea028748dfbe47.exe
Resource
win10v2004-20231215-en
General
-
Target
7c1a44bdd0a9900a33ea028748dfbe47.exe
-
Size
54KB
-
MD5
7c1a44bdd0a9900a33ea028748dfbe47
-
SHA1
b95950bb0a953cb81faada85820a97c4156a0da4
-
SHA256
48fbaea0f585e003e776a576b118aa4987760fd21d4682f91448dc892ee07c57
-
SHA512
b9d105ea5d1f7dd7c93e26e54ea7d98d2f35e62bdb0efa11ccef214adedd52671fa1a304d6680c915cb581202a2ef50f378e956a6642962216540117ad9dd8bc
-
SSDEEP
768:w5Je+RTWOlDwrEDIhpUbB9HEKaubTHhSVzS8LFWVlDOAbuU5QAeu4Vf:w5A+RbqEDQp4kPup22lDOAbu6OuQ
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2468-3-0x0000000000400000-0x0000000000422000-memory.dmp family_gh0strat behavioral1/files/0x0008000000012255-2.dat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Microsoft MR\Parameters\ServiceDll = "C:\\Windows\\system32\\360SP2.dll" 7c1a44bdd0a9900a33ea028748dfbe47.exe -
Deletes itself 1 IoCs
pid Process 3044 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 3044 svchost.exe -
resource yara_rule behavioral1/memory/2468-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2468-3-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\360SP2.dll 7c1a44bdd0a9900a33ea028748dfbe47.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c1a44bdd0a9900a33ea028748dfbe47.exe"C:\Users\Admin\AppData\Local\Temp\7c1a44bdd0a9900a33ea028748dfbe47.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
PID:2468
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5415996fb0240018f270c2d61a43afe52
SHA1f681e60ec13b7d8c932ebc79cf6f652c6605900a
SHA25646d1855872e16ef2f105846e4e4e83f59c095c84008f6740122aaa4ea6732562
SHA51275d9fee7411b08c1e9c69a7314dbb872bbcdae52b0eca147c1dc1171b0e913a4cfbb6ac5d2dc678f5846386cb7c872a075fefc3f7821a3e9243e91f88a15ba0e