Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 14:16

General

  • Target

    tmp.exe

  • Size

    156KB

  • MD5

    0f9e62354cf5353a7adcbe67cd3bcd93

  • SHA1

    8416803e9819e46032a036b5d35d1ca628cf2b76

  • SHA256

    46bed426035dbd31cb6736dd3f573944d0c47e3d474b02fef43b537bf2ec2e3e

  • SHA512

    7b4d05d867f6e1b3b8356fe295f536aece5b92d38051d10b9054b4b626928fbc4b94c948f894c182214911be2564d838c56a0ab62ecf642f1bed1447d24120ad

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: RenamesItself
    PID:2584
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "windowsϵͳÖ÷¶¯·ÀÓù"
    1⤵
      PID:4156
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "windowsϵͳÖ÷¶¯·ÀÓù"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\Windows\SysWOW64\windowsϵͳÖ÷¶¯·ÀÓù.exe
        C:\Windows\system32\windowsϵͳÖ÷¶¯·ÀÓù.exe "c:\windows\system32\240548359.jpg",MainInstall
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1232

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\240548359.jpg
      Filesize

      56KB

      MD5

      c6f4236d5f7929a26adec9ba633c507b

      SHA1

      293667b7ef95c9fa29df0e822c074804fdd9c56a

      SHA256

      c93c2117ff7edbd247979093f826759455c9cd536087daa568a3b6ba570b0aba

      SHA512

      cd8178575393f6b9ff0889c198ea543cb4928e34174681fef7ac67f57912cbd2d398fca73861d9c36e9bb58010c2a8af789ca7872d96f6b7c9c10f498d8dc70a

    • C:\Windows\SysWOW64\240548359.jpg
      Filesize

      56KB

      MD5

      c6f4236d5f7929a26adec9ba633c507b

      SHA1

      293667b7ef95c9fa29df0e822c074804fdd9c56a

      SHA256

      c93c2117ff7edbd247979093f826759455c9cd536087daa568a3b6ba570b0aba

      SHA512

      cd8178575393f6b9ff0889c198ea543cb4928e34174681fef7ac67f57912cbd2d398fca73861d9c36e9bb58010c2a8af789ca7872d96f6b7c9c10f498d8dc70a

    • C:\Windows\SysWOW64\240548359.jpg
      Filesize

      56KB

      MD5

      c6f4236d5f7929a26adec9ba633c507b

      SHA1

      293667b7ef95c9fa29df0e822c074804fdd9c56a

      SHA256

      c93c2117ff7edbd247979093f826759455c9cd536087daa568a3b6ba570b0aba

      SHA512

      cd8178575393f6b9ff0889c198ea543cb4928e34174681fef7ac67f57912cbd2d398fca73861d9c36e9bb58010c2a8af789ca7872d96f6b7c9c10f498d8dc70a

    • C:\Windows\SysWOW64\windowsϵͳÖ÷¶¯·ÀÓù.exe
      Filesize

      60KB

      MD5

      889b99c52a60dd49227c5e485a016679

      SHA1

      8fa889e456aa646a4d0a4349977430ce5fa5e2d7

      SHA256

      6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910

      SHA512

      08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641

    • C:\Windows\SysWOW64\windowsϵͳÖ÷¶¯·ÀÓù.exe
      Filesize

      60KB

      MD5

      889b99c52a60dd49227c5e485a016679

      SHA1

      8fa889e456aa646a4d0a4349977430ce5fa5e2d7

      SHA256

      6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910

      SHA512

      08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641

    • \??\c:\windows\SysWOW64\240548359.jpg
      Filesize

      56KB

      MD5

      c6f4236d5f7929a26adec9ba633c507b

      SHA1

      293667b7ef95c9fa29df0e822c074804fdd9c56a

      SHA256

      c93c2117ff7edbd247979093f826759455c9cd536087daa568a3b6ba570b0aba

      SHA512

      cd8178575393f6b9ff0889c198ea543cb4928e34174681fef7ac67f57912cbd2d398fca73861d9c36e9bb58010c2a8af789ca7872d96f6b7c9c10f498d8dc70a

    • memory/1232-133-0x0000000000000000-mapping.dmp