Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
c2a865802a96f54dc8eed392bb3d6553.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2a865802a96f54dc8eed392bb3d6553.exe
Resource
win10v2004-20240226-en
General
-
Target
c2a865802a96f54dc8eed392bb3d6553.exe
-
Size
668KB
-
MD5
c2a865802a96f54dc8eed392bb3d6553
-
SHA1
91ce2347f463f859c15197dbeb5397fd3b698301
-
SHA256
c5b1662a3a2375fd65f40d8494f57b3f35382ee43ee61937e52d5acb4b3094c2
-
SHA512
1c18786e74156b9049827beceac805f761df9035aed1ec01803f927fcc63debbfe4362563db79ee086ee739229e5686c0a944125322b184ed62cd788db0e444a
-
SSDEEP
12288:wejttGEcXBQrfVugH89lSikEPG5AFhdIQZbpUwR:wejt0WfHmlhYcfVj
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral2/memory/4612-2-0x0000000000400000-0x00000000004CB000-memory.dmp family_gh0strat behavioral2/memory/4612-3-0x0000000000400000-0x00000000004CB000-memory.dmp family_gh0strat behavioral2/memory/4612-4-0x0000000000400000-0x00000000004CB000-memory.dmp family_gh0strat behavioral2/memory/4612-8-0x0000000000400000-0x00000000004CB000-memory.dmp family_gh0strat behavioral2/memory/4612-6-0x0000000000400000-0x00000000004CB000-memory.dmp family_gh0strat behavioral2/memory/4612-10-0x0000000000400000-0x00000000004CB000-memory.dmp family_gh0strat behavioral2/files/0x0008000000023208-11.dat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Microsoft MR\Parameters\ServiceDll = "C:\\Windows\\system32\\360SP2.dll" c2a865802a96f54dc8eed392bb3d6553.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c2a865802a96f54dc8eed392bb3d6553.exe -
Loads dropped DLL 1 IoCs
pid Process 1184 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\360SP2.dll c2a865802a96f54dc8eed392bb3d6553.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2a865802a96f54dc8eed392bb3d6553.exe"C:\Users\Admin\AppData\Local\Temp\c2a865802a96f54dc8eed392bb3d6553.exe"1⤵
- Sets DLL path for service in the registry
- Checks BIOS information in registry
- Drops file in System32 directory
PID:4612
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5f0acba287b25647e60ade09c5b260f7b
SHA16cc61ff9013b8bc717fea6f79f80aa0dc9b1b6e3
SHA256296263bd6670fd2ab78a4abcdcd020987fc6d0eae47d410125fbc572dd861a3b
SHA5125ffbe0663b5cb05ee55cb0ef9180409acf9899d42aa2bd6c2d461564ea9d73018a856a9cd38979a4b6c6f2dcef75e6569139ca19a3c54024aa7286e76bf9eaa2