Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 11:19
Static task
static1
Behavioral task
behavioral1
Sample
806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b.exe
Resource
win10v2004-20241007-en
General
-
Target
806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b.exe
-
Size
388KB
-
MD5
5ff4d21d752c9ac5d796d6e52dc3b15d
-
SHA1
3fad1394f5278c5500ee62d90c0d3df8b1af73e0
-
SHA256
806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b
-
SHA512
1942b1d9c0467357415c9d93c05186a03adc34a31371131eabb0d7e87da170567c0e835e9d105991d65ec57eaa5116a6e3d21e52661e248b34c5468f760e8e1d
-
SSDEEP
3072:6yK/yLrQbWaR5Qax8c/YtYfK/tQSX0R9P87q5ECq+SzUPxi+SXxF:6NyLEbWaR5CcFuZoC8ET+S4ZbSXxF
Malware Config
Extracted
gh0strat
192.168.1.2
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2544-0-0x0000000010000000-0x0000000010017000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 2 IoCs
Processes:
Eigekeu.scrEigekeu.scrpid process 2332 Eigekeu.scr 2900 Eigekeu.scr -
Drops file in Program Files directory 2 IoCs
Processes:
806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b.exedescription ioc process File created C:\Program Files (x86)\Eigekeu.scr 806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b.exe File opened for modification C:\Program Files (x86)\Eigekeu.scr 806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b.exeEigekeu.scrEigekeu.scrdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eigekeu.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eigekeu.scr -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Eigekeu.scrdescription pid process target process PID 2332 wrote to memory of 2900 2332 Eigekeu.scr Eigekeu.scr PID 2332 wrote to memory of 2900 2332 Eigekeu.scr Eigekeu.scr PID 2332 wrote to memory of 2900 2332 Eigekeu.scr Eigekeu.scr PID 2332 wrote to memory of 2900 2332 Eigekeu.scr Eigekeu.scr
Processes
-
C:\Users\Admin\AppData\Local\Temp\806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b.exe"C:\Users\Admin\AppData\Local\Temp\806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2544
-
C:\Program Files (x86)\Eigekeu.scr"C:\Program Files (x86)\Eigekeu.scr"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Eigekeu.scr"C:\Program Files (x86)\Eigekeu.scr" Win72⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD55ff4d21d752c9ac5d796d6e52dc3b15d
SHA13fad1394f5278c5500ee62d90c0d3df8b1af73e0
SHA256806b77638493b3ff52dbc27f0d2d2257d606cf4f69c2ecb509a4141bdc322b2b
SHA5121942b1d9c0467357415c9d93c05186a03adc34a31371131eabb0d7e87da170567c0e835e9d105991d65ec57eaa5116a6e3d21e52661e248b34c5468f760e8e1d