Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
0cc64cd7982a030daa66d9baf14ac1cc7d218430114faf07492ef8306fe9dc8a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0cc64cd7982a030daa66d9baf14ac1cc7d218430114faf07492ef8306fe9dc8a.exe
Resource
win10v2004-20250217-en
General
-
Target
0cc64cd7982a030daa66d9baf14ac1cc7d218430114faf07492ef8306fe9dc8a.exe
-
Size
380KB
-
MD5
89de8eec7fc87a116453b64236365a00
-
SHA1
1b9d6ef51b7e67c778cd57e08810598e54d11dfc
-
SHA256
0cc64cd7982a030daa66d9baf14ac1cc7d218430114faf07492ef8306fe9dc8a
-
SHA512
e39ab8ace215fab53d99cc972eeb1823b5da50247e0c37455a8e0d410e4db2a23ce7fbae3b676e519c662b84626216578c61004aaaf0f65c9300c0240ca26f8b
-
SSDEEP
3072:rIXcNc8ES3qngZtZ3rEH/75umQjaGJd9W:rIMNc8ESDZMThGJd9W
Malware Config
Extracted
gh0strat
156.232.11.47
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2404-0-0x0000000010000000-0x0000000010010000-memory.dmp family_gh0strat behavioral1/memory/2404-16-0x0000000000400000-0x0000000000460000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 2 IoCs
pid Process 2224 Qkiuakk.bat 2248 Qkiuakk.bat -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Qkiuakk.bat 0cc64cd7982a030daa66d9baf14ac1cc7d218430114faf07492ef8306fe9dc8a.exe File opened for modification C:\Program Files (x86)\Qkiuakk.bat 0cc64cd7982a030daa66d9baf14ac1cc7d218430114faf07492ef8306fe9dc8a.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cc64cd7982a030daa66d9baf14ac1cc7d218430114faf07492ef8306fe9dc8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qkiuakk.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qkiuakk.bat -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2404 0cc64cd7982a030daa66d9baf14ac1cc7d218430114faf07492ef8306fe9dc8a.exe 2224 Qkiuakk.bat 2248 Qkiuakk.bat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2404 0cc64cd7982a030daa66d9baf14ac1cc7d218430114faf07492ef8306fe9dc8a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2248 2224 Qkiuakk.bat 32 PID 2224 wrote to memory of 2248 2224 Qkiuakk.bat 32 PID 2224 wrote to memory of 2248 2224 Qkiuakk.bat 32 PID 2224 wrote to memory of 2248 2224 Qkiuakk.bat 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cc64cd7982a030daa66d9baf14ac1cc7d218430114faf07492ef8306fe9dc8a.exe"C:\Users\Admin\AppData\Local\Temp\0cc64cd7982a030daa66d9baf14ac1cc7d218430114faf07492ef8306fe9dc8a.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2404
-
C:\Program Files (x86)\Qkiuakk.bat"C:\Program Files (x86)\Qkiuakk.bat"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Qkiuakk.bat"C:\Program Files (x86)\Qkiuakk.bat" Win72⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2248
-