Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2025, 08:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe
Resource
win10v2004-20250314-en
7 signatures
150 seconds
General
-
Target
08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe
-
Size
376KB
-
MD5
9b7268cad5fba0526815c4f0b174abe2
-
SHA1
443c188d5cc8f72a413ada01156682b789d249ab
-
SHA256
08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8
-
SHA512
7fe3c4aeb7f65e6e02cb446d9f0c4374bc24cac000e39582a2e680e21d2090f424e8a5abe834fe859d99b1982e64e6ec52e2fb05753f2f41a6e5f5c542cf26de
-
SSDEEP
6144:ROyLEbWaR5Cc/8JFmuy4ixRDDDDhVZGYzaQ:cUaWaR5v/6q7hZG
Score
10/10
Malware Config
Extracted
Family
gh0strat
C2
127.0.0.1
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/968-0-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat -
Gh0strat family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe" 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 968 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe 968 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe 968 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe 968 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe 968 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe 968 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe 528 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe 528 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe 528 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe 528 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe 528 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe 528 08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4716 wrote to memory of 528 4716 cmd.exe 89 PID 4716 wrote to memory of 528 4716 cmd.exe 89 PID 4716 wrote to memory of 528 4716 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe"C:\Users\Admin\AppData\Local\Temp\08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:968
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exeC:\Users\Admin\AppData\Local\Temp\08dea35cc0044a141f7509885d266dce877fb2ec5d0644e5a8c3bd8501a60bf8.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:528
-