Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-11-2024 12:07
Static task
static1
Behavioral task
behavioral1
Sample
a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe
-
Size
328KB
-
MD5
547b878574ddb23538a8d3409ce702b0
-
SHA1
ede7adac69f17ed846624c8942e5bdf5a737b164
-
SHA256
a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78
-
SHA512
966d6b8d7b91f2195e575ff175f718bf66de61830752e88d0f23956c4dbb9069e11002496bb5c31a21bb651687257994d0b28d7bae937fb46fb62f45bf055e90
-
SSDEEP
6144:4eKKtlCCp1fBpzhhh2KNZbBKKKrx90J8GtiU67+arHM:hlBpBBpcKwnON6Cars
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral4/memory/3012-0-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral4/memory/3012-5-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral4/memory/3012-14-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat -
Gh0strat family
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 3728 a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78Srv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe" a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe -
resource yara_rule behavioral4/files/0x000d000000025e5c-6.dat upx behavioral4/memory/3728-8-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral4/memory/3728-11-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 976 3728 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78Srv.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3012 a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe 3012 a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe 3012 a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe 3012 a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3728 3012 a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe 80 PID 3012 wrote to memory of 3728 3012 a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe 80 PID 3012 wrote to memory of 3728 3012 a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe"C:\Users\Admin\AppData\Local\Temp\a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78Srv.exeC:\Users\Admin\AppData\Local\Temp\a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78Srv.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 3203⤵
- Program crash
PID:976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3728 -ip 37281⤵PID:4572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a200023b3ff5786e5e4d90ff8fb355a4bbbe052861871e29a361d2d04233da78Srv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a