Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 09:55
Behavioral task
behavioral1
Sample
8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe
Resource
win10v2004-20240802-en
General
-
Target
8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe
-
Size
133KB
-
MD5
395bb7ea9944773809df27b69422d67b
-
SHA1
0c422257fa0917e4e176a74dc46f059abc8859f4
-
SHA256
8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303
-
SHA512
12ef46e547db9a13969300e7a4723aa0ab4f99229f68c528c140f0da8967267dea65004306b9b63476612567bc3103e4b6bb273f2162f3a06f2a1d6912e61d64
-
SSDEEP
3072:6yIpG2/iDbYvGY4/BL/MDOw//5zzDVL7Jjk/dR8iV:rIposOpwJzzi8iV
Malware Config
Extracted
gh0strat
10.111.253.140
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/1876-1-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral1/memory/2804-15-0x0000000000400000-0x000000000046D000-memory.dmp family_gh0strat behavioral1/memory/2820-19-0x0000000000400000-0x000000000046D000-memory.dmp family_gh0strat behavioral1/memory/1876-20-0x0000000000400000-0x000000000046D000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2804 Cxmkrzh.scr 2820 Cxmkrzh.scr -
resource yara_rule behavioral1/memory/1876-0-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2804-15-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2820-19-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1876-20-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Cxmkrzh.scr 8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe File opened for modification C:\Program Files (x86)\Cxmkrzh.scr 8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cxmkrzh.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cxmkrzh.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1876 8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe 1876 8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe 1876 8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe 2804 Cxmkrzh.scr 2804 Cxmkrzh.scr 2804 Cxmkrzh.scr 2820 Cxmkrzh.scr 2820 Cxmkrzh.scr 2820 Cxmkrzh.scr -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1876 8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2820 2804 Cxmkrzh.scr 31 PID 2804 wrote to memory of 2820 2804 Cxmkrzh.scr 31 PID 2804 wrote to memory of 2820 2804 Cxmkrzh.scr 31 PID 2804 wrote to memory of 2820 2804 Cxmkrzh.scr 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe"C:\Users\Admin\AppData\Local\Temp\8473d4b398a72605f8cfbffbc45709f9267a173208cb8814caba98b4d8c53303.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1876
-
C:\Program Files (x86)\Cxmkrzh.scr"C:\Program Files (x86)\Cxmkrzh.scr"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Cxmkrzh.scr"C:\Program Files (x86)\Cxmkrzh.scr" Win72⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2820
-