Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 00:55
Behavioral task
behavioral1
Sample
98108d05f89317261c2b79d2fb09dca8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
98108d05f89317261c2b79d2fb09dca8.exe
Resource
win10v2004-20231222-en
General
-
Target
98108d05f89317261c2b79d2fb09dca8.exe
-
Size
1.1MB
-
MD5
98108d05f89317261c2b79d2fb09dca8
-
SHA1
ae202e34bfddf36c9e0e03f2e172c4d878e2a8a1
-
SHA256
79f6ca77bfc18da5dfe05f7ce7e5bd2d41d2ab0377b113b4dad54fe6821e6c06
-
SHA512
176cf85350a5f96b0651efbb305c87d9022e95257d401584f6bd5dcf56db9c93f32b64208c850b64af48895005e89e31d4c3d5f19abf95b1e959e8b3d56caee0
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZpB:iM5j8Z3aKHx5r+TuxX+IwffFZpB
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b0000000122e4-6.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1716 svchest001465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 98108d05f89317261c2b79d2fb09dca8.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\svchest001465662051.exe 98108d05f89317261c2b79d2fb09dca8.exe File opened for modification \??\c:\Windows\svchest001465662051.exe 98108d05f89317261c2b79d2fb09dca8.exe File created \??\c:\Windows\notepab.exe 98108d05f89317261c2b79d2fb09dca8.exe File created \??\c:\Windows\BJ.exe 98108d05f89317261c2b79d2fb09dca8.exe File opened for modification \??\c:\Windows\BJ.exe 98108d05f89317261c2b79d2fb09dca8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1716 2924 98108d05f89317261c2b79d2fb09dca8.exe 28 PID 2924 wrote to memory of 1716 2924 98108d05f89317261c2b79d2fb09dca8.exe 28 PID 2924 wrote to memory of 1716 2924 98108d05f89317261c2b79d2fb09dca8.exe 28 PID 2924 wrote to memory of 1716 2924 98108d05f89317261c2b79d2fb09dca8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\98108d05f89317261c2b79d2fb09dca8.exe"C:\Users\Admin\AppData\Local\Temp\98108d05f89317261c2b79d2fb09dca8.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\Windows\svchest001465662051.exec:\Windows\svchest001465662051.exe2⤵
- Executes dropped EXE
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD598108d05f89317261c2b79d2fb09dca8
SHA1ae202e34bfddf36c9e0e03f2e172c4d878e2a8a1
SHA25679f6ca77bfc18da5dfe05f7ce7e5bd2d41d2ab0377b113b4dad54fe6821e6c06
SHA512176cf85350a5f96b0651efbb305c87d9022e95257d401584f6bd5dcf56db9c93f32b64208c850b64af48895005e89e31d4c3d5f19abf95b1e959e8b3d56caee0