Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 01:13
Behavioral task
behavioral1
Sample
7e7bf9e505bf432dd714964318ffbf8d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7e7bf9e505bf432dd714964318ffbf8d.exe
Resource
win10v2004-20231215-en
General
-
Target
7e7bf9e505bf432dd714964318ffbf8d.exe
-
Size
801KB
-
MD5
7e7bf9e505bf432dd714964318ffbf8d
-
SHA1
52b7721d278c191412d0a0d5423c0863a5602503
-
SHA256
e1d61c92d034fc0435231be88adfca06d344928a9d364a44e42f29359b86ba3b
-
SHA512
ba45df207113cf89581e12a008c8f759668cce6dba3358eefda7f91e8bd6a19c39c5e3f2ad0c93861055f038bcec844a1b0848a31ac00d1634b75cf344abfd30
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZKsLU:iM5j8Z3aKHx5r+TuxX+IwffFZKsLU
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023207-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 4956 svchest432048043204801465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 7e7bf9e505bf432dd714964318ffbf8d.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 7e7bf9e505bf432dd714964318ffbf8d.exe File opened for modification \??\c:\Windows\BJ.exe 7e7bf9e505bf432dd714964318ffbf8d.exe File created \??\c:\Windows\svchest432048043204801465662051.exe 7e7bf9e505bf432dd714964318ffbf8d.exe File opened for modification \??\c:\Windows\svchest432048043204801465662051.exe 7e7bf9e505bf432dd714964318ffbf8d.exe File created \??\c:\Windows\notepab.exe 7e7bf9e505bf432dd714964318ffbf8d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2580 wrote to memory of 4956 2580 7e7bf9e505bf432dd714964318ffbf8d.exe 85 PID 2580 wrote to memory of 4956 2580 7e7bf9e505bf432dd714964318ffbf8d.exe 85 PID 2580 wrote to memory of 4956 2580 7e7bf9e505bf432dd714964318ffbf8d.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e7bf9e505bf432dd714964318ffbf8d.exe"C:\Users\Admin\AppData\Local\Temp\7e7bf9e505bf432dd714964318ffbf8d.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\Windows\svchest432048043204801465662051.exec:\Windows\svchest432048043204801465662051.exe2⤵
- Executes dropped EXE
PID:4956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
801KB
MD57e7bf9e505bf432dd714964318ffbf8d
SHA152b7721d278c191412d0a0d5423c0863a5602503
SHA256e1d61c92d034fc0435231be88adfca06d344928a9d364a44e42f29359b86ba3b
SHA512ba45df207113cf89581e12a008c8f759668cce6dba3358eefda7f91e8bd6a19c39c5e3f2ad0c93861055f038bcec844a1b0848a31ac00d1634b75cf344abfd30