Analysis

  • max time kernel
    142s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 06:56

General

  • Target

    2011410111921.exe

  • Size

    5.3MB

  • MD5

    1b8e2953b715467cffc3b730115a3b11

  • SHA1

    c3fcdb8c4bc0abe5d8674d3ebae78e3e0c437bd5

  • SHA256

    3277f0e5bfa3793d8106859c3d5c2881385fa9d3092a3bc589e3255e07be18ae

  • SHA512

    8fe05e35ac110180b11dc931f477014d25bd6056ceddcc014c87dc23077589c1cde7b041ca2a576d24a0c7e9dac0649a0cf736ee7a1029e31918d60372c48d5a

  • SSDEEP

    6144:OVoG34nDWgRAkPHZQWfcMloDgI4o8VoGi4nDWgRAkPHZQWfcMloDgI4o4sOI:OVovR3PHHbywVoqR3PHHbyUsOI

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2011410111921.exe
    "C:\Users\Admin\AppData\Local\Temp\2011410111921.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2924-0-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2924-1-0x0000000000240000-0x0000000000264000-memory.dmp

    Filesize

    144KB

  • memory/2924-2-0x0000000000240000-0x0000000000264000-memory.dmp

    Filesize

    144KB

  • memory/2924-3-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2924-6-0x0000000000401000-0x0000000000415000-memory.dmp

    Filesize

    80KB

  • memory/2924-5-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2924-4-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2924-8-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2924-10-0x0000000000240000-0x0000000000264000-memory.dmp

    Filesize

    144KB