Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 16:21
Behavioral task
behavioral1
Sample
9c1ff1f3778cdecc7d51c6983b3825fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c1ff1f3778cdecc7d51c6983b3825fe.exe
Resource
win10v2004-20231222-en
General
-
Target
9c1ff1f3778cdecc7d51c6983b3825fe.exe
-
Size
849KB
-
MD5
9c1ff1f3778cdecc7d51c6983b3825fe
-
SHA1
0ef88e92a2d7513200896482fa9f54c855b7cfc3
-
SHA256
e93cf8c4f0d8d3ba15496f3d272cc8074182ba88c5b0d782615f1a14e874c91f
-
SHA512
4583e6688f7bc4d263745590ee56b87904636d5548d122b8cbd11d592aff246482b3a718fccc137cac0a425df3d7daa395612f5f0f375bbd04a794678546ee4b
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZKF+:iM5j8Z3aKHx5r+TuxX+IwffFZKF+
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000d0000000122c3-6.dat family_gh0strat behavioral1/files/0x0008000000012248-3.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2432 svchest001465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 9c1ff1f3778cdecc7d51c6983b3825fe.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 9c1ff1f3778cdecc7d51c6983b3825fe.exe File opened for modification \??\c:\Windows\BJ.exe 9c1ff1f3778cdecc7d51c6983b3825fe.exe File created \??\c:\Windows\svchest001465662051.exe 9c1ff1f3778cdecc7d51c6983b3825fe.exe File opened for modification \??\c:\Windows\svchest001465662051.exe 9c1ff1f3778cdecc7d51c6983b3825fe.exe File created \??\c:\Windows\notepab.exe 9c1ff1f3778cdecc7d51c6983b3825fe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2432 2204 9c1ff1f3778cdecc7d51c6983b3825fe.exe 27 PID 2204 wrote to memory of 2432 2204 9c1ff1f3778cdecc7d51c6983b3825fe.exe 27 PID 2204 wrote to memory of 2432 2204 9c1ff1f3778cdecc7d51c6983b3825fe.exe 27 PID 2204 wrote to memory of 2432 2204 9c1ff1f3778cdecc7d51c6983b3825fe.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c1ff1f3778cdecc7d51c6983b3825fe.exe"C:\Users\Admin\AppData\Local\Temp\9c1ff1f3778cdecc7d51c6983b3825fe.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\Windows\svchest001465662051.exec:\Windows\svchest001465662051.exe2⤵
- Executes dropped EXE
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
849KB
MD5045d430ceaa22a3e8dddbdd4adfdc589
SHA17ae710303a49431ae708a4f7dcfd938b39f5213e
SHA256a6ca8983cd0a6ef83269a04b8d27f89a2dd943e312ca3f09cb93759f45aec18c
SHA5129f3ede12b9a8a485e575f5206adcc4507615702513bb998b156f7df880d4e13d35964da33921bcc54776bb9f1bddcebfc410e043e63e6d110e8476fdb2d72681
-
Filesize
849KB
MD59c1ff1f3778cdecc7d51c6983b3825fe
SHA10ef88e92a2d7513200896482fa9f54c855b7cfc3
SHA256e93cf8c4f0d8d3ba15496f3d272cc8074182ba88c5b0d782615f1a14e874c91f
SHA5124583e6688f7bc4d263745590ee56b87904636d5548d122b8cbd11d592aff246482b3a718fccc137cac0a425df3d7daa395612f5f0f375bbd04a794678546ee4b