Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    01-07-2022 00:11

General

  • Target

    3f8c1e5dc8ea2e6aff80b31aeb4e626597e144ec58f460e481bf1f50f7d1e60a.exe

  • Size

    180KB

  • MD5

    72dd8f8700c52b00c1b95fa29fbcd30e

  • SHA1

    05b1e71bba9e8ed49968569ad3124abd937d30ab

  • SHA256

    3f8c1e5dc8ea2e6aff80b31aeb4e626597e144ec58f460e481bf1f50f7d1e60a

  • SHA512

    eee3e7377f4555cb2c587045f7fcd15d8ec76b978de8f34ef360d415dccd9641069feb313a8f6ffe13e3f5b3c39a128f7902e58da7ef26a3bd44db112b4fd58a

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f8c1e5dc8ea2e6aff80b31aeb4e626597e144ec58f460e481bf1f50f7d1e60a.exe
    "C:\Users\Admin\AppData\Local\Temp\3f8c1e5dc8ea2e6aff80b31aeb4e626597e144ec58f460e481bf1f50f7d1e60a.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3F8C1E~1.EXE > nul
      2⤵
        PID:4508
    • C:\Windows\SysWOW64\seser.exe
      C:\Windows\SysWOW64\seser.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Windows\SysWOW64\seser.exe
        C:\Windows\SysWOW64\seser.exe Win7
        2⤵
        • Executes dropped EXE
        PID:4484
      • C:\Windows\SysWOW64\seser.exe
        C:\Windows\SysWOW64\seser.exe Win7
        2⤵
        • Executes dropped EXE
        PID:4668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 680
        2⤵
        • Program crash
        PID:4004
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1008 -ip 1008
      1⤵
        PID:4212

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\seser.exe
        Filesize

        180KB

        MD5

        72dd8f8700c52b00c1b95fa29fbcd30e

        SHA1

        05b1e71bba9e8ed49968569ad3124abd937d30ab

        SHA256

        3f8c1e5dc8ea2e6aff80b31aeb4e626597e144ec58f460e481bf1f50f7d1e60a

        SHA512

        eee3e7377f4555cb2c587045f7fcd15d8ec76b978de8f34ef360d415dccd9641069feb313a8f6ffe13e3f5b3c39a128f7902e58da7ef26a3bd44db112b4fd58a

      • C:\Windows\SysWOW64\seser.exe
        Filesize

        180KB

        MD5

        72dd8f8700c52b00c1b95fa29fbcd30e

        SHA1

        05b1e71bba9e8ed49968569ad3124abd937d30ab

        SHA256

        3f8c1e5dc8ea2e6aff80b31aeb4e626597e144ec58f460e481bf1f50f7d1e60a

        SHA512

        eee3e7377f4555cb2c587045f7fcd15d8ec76b978de8f34ef360d415dccd9641069feb313a8f6ffe13e3f5b3c39a128f7902e58da7ef26a3bd44db112b4fd58a

      • C:\Windows\SysWOW64\seser.exe
        Filesize

        180KB

        MD5

        72dd8f8700c52b00c1b95fa29fbcd30e

        SHA1

        05b1e71bba9e8ed49968569ad3124abd937d30ab

        SHA256

        3f8c1e5dc8ea2e6aff80b31aeb4e626597e144ec58f460e481bf1f50f7d1e60a

        SHA512

        eee3e7377f4555cb2c587045f7fcd15d8ec76b978de8f34ef360d415dccd9641069feb313a8f6ffe13e3f5b3c39a128f7902e58da7ef26a3bd44db112b4fd58a

      • C:\Windows\SysWOW64\seser.exe
        Filesize

        180KB

        MD5

        72dd8f8700c52b00c1b95fa29fbcd30e

        SHA1

        05b1e71bba9e8ed49968569ad3124abd937d30ab

        SHA256

        3f8c1e5dc8ea2e6aff80b31aeb4e626597e144ec58f460e481bf1f50f7d1e60a

        SHA512

        eee3e7377f4555cb2c587045f7fcd15d8ec76b978de8f34ef360d415dccd9641069feb313a8f6ffe13e3f5b3c39a128f7902e58da7ef26a3bd44db112b4fd58a

      • memory/1008-136-0x0000000010000000-0x0000000010023000-memory.dmp
        Filesize

        140KB

      • memory/3292-130-0x0000000010000000-0x0000000010023000-memory.dmp
        Filesize

        140KB

      • memory/4484-140-0x0000000000000000-mapping.dmp
      • memory/4508-152-0x0000000000000000-mapping.dmp
      • memory/4668-141-0x0000000000000000-mapping.dmp