Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 01:14
Behavioral task
behavioral1
Sample
8b022ba9ff723123fc0d8e8ce7f7039d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b022ba9ff723123fc0d8e8ce7f7039d.exe
Resource
win10v2004-20231215-en
General
-
Target
8b022ba9ff723123fc0d8e8ce7f7039d.exe
-
Size
909KB
-
MD5
8b022ba9ff723123fc0d8e8ce7f7039d
-
SHA1
14ee9ef12f31c4b1b7c4319ef02b46ae98e51217
-
SHA256
f133e39bb32a981d9c64dc7bd4a6c2aae99a992a8c25d86121885c6638d43b63
-
SHA512
defa498dce5114f28794abf7ac13792e2cf4c892d506f8d6594a72ed95cf4133524939ab3dc387da6b98d09c2e7a9d5588ef3d6360ba162762db721f94d29b2d
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZ1vrV:iM5j8Z3aKHx5r+TuxX+IwffFZ1vrV
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023210-5.dat family_gh0strat behavioral2/files/0x0007000000023210-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2764 svchest432048043204801465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 8b022ba9ff723123fc0d8e8ce7f7039d.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\Windows\svchest432048043204801465662051.exe 8b022ba9ff723123fc0d8e8ce7f7039d.exe File created \??\c:\Windows\notepab.exe 8b022ba9ff723123fc0d8e8ce7f7039d.exe File created \??\c:\Windows\BJ.exe 8b022ba9ff723123fc0d8e8ce7f7039d.exe File opened for modification \??\c:\Windows\BJ.exe 8b022ba9ff723123fc0d8e8ce7f7039d.exe File created \??\c:\Windows\svchest432048043204801465662051.exe 8b022ba9ff723123fc0d8e8ce7f7039d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3252 wrote to memory of 2764 3252 8b022ba9ff723123fc0d8e8ce7f7039d.exe 86 PID 3252 wrote to memory of 2764 3252 8b022ba9ff723123fc0d8e8ce7f7039d.exe 86 PID 3252 wrote to memory of 2764 3252 8b022ba9ff723123fc0d8e8ce7f7039d.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b022ba9ff723123fc0d8e8ce7f7039d.exe"C:\Users\Admin\AppData\Local\Temp\8b022ba9ff723123fc0d8e8ce7f7039d.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3252 -
\??\c:\Windows\svchest432048043204801465662051.exec:\Windows\svchest432048043204801465662051.exe2⤵
- Executes dropped EXE
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
909KB
MD58b022ba9ff723123fc0d8e8ce7f7039d
SHA114ee9ef12f31c4b1b7c4319ef02b46ae98e51217
SHA256f133e39bb32a981d9c64dc7bd4a6c2aae99a992a8c25d86121885c6638d43b63
SHA512defa498dce5114f28794abf7ac13792e2cf4c892d506f8d6594a72ed95cf4133524939ab3dc387da6b98d09c2e7a9d5588ef3d6360ba162762db721f94d29b2d
-
Filesize
849KB
MD56af7508e43fcf65410bbf2faef27e6e6
SHA121b27fdafad0e12b1b036e08c9378e2f35899979
SHA2561c1a366b160bbe4bcc37516678bb3ffa95f3acdd9d6844511a44ad33ed27d619
SHA5125979974742420b14a7583119dabb6e5b48bba7d2968cffd2f674a7c41cf569fbef555181c5c69c8f80327be678f684cb007cf347511b86dd5ffdef055cc5ae8a