Analysis

  • max time kernel
    152s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 13:30 UTC

General

  • Target

    546dfbdcf904d726960dd8db1934f21b578c454a7902bbbcff24c6cf5b69e1f5.exe

  • Size

    98KB

  • MD5

    5254b8f557e9234701b2974c476e8c3c

  • SHA1

    8714e109c9a3d3c2a55a1176060c54b76cb39678

  • SHA256

    546dfbdcf904d726960dd8db1934f21b578c454a7902bbbcff24c6cf5b69e1f5

  • SHA512

    c0bc208a8a184fcd914f35502ebab99c015a2b87a3087860825a8250089121bee8ac7253a92f25f839ba3cc68e7ff03132a2e9aa25c4e877894bf855db6ad173

  • SSDEEP

    1536:0pFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8pr1CDPODmqo5Rh/b:0/S4jHS8q/3nTzePCwNUh4E9G87Gb

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 7 IoCs
  • Program crash 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\546dfbdcf904d726960dd8db1934f21b578c454a7902bbbcff24c6cf5b69e1f5.exe
    "C:\Users\Admin\AppData\Local\Temp\546dfbdcf904d726960dd8db1934f21b578c454a7902bbbcff24c6cf5b69e1f5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • \??\c:\users\admin\appdata\local\mtbehlyysp
      "C:\Users\Admin\AppData\Local\Temp\546dfbdcf904d726960dd8db1934f21b578c454a7902bbbcff24c6cf5b69e1f5.exe" a -sc:\users\admin\appdata\local\temp\546dfbdcf904d726960dd8db1934f21b578c454a7902bbbcff24c6cf5b69e1f5.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3440
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4856
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 1020
      2⤵
      • Program crash
      PID:1788
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4856 -ip 4856
    1⤵
      PID:5076
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1136
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 1072
        2⤵
        • Program crash
        PID:1256
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1136 -ip 1136
      1⤵
        PID:1916
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
        1⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        PID:816
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 828
          2⤵
          • Program crash
          PID:3244
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 816 -ip 816
        1⤵
          PID:768

        Network

        • flag-us
          DNS
          conf.f.360.cn
          fastuserswitchingcompatibility
          Remote address:
          8.8.8.8:53
          Request
          conf.f.360.cn
          IN A
          Response
          conf.f.360.cn
          IN CNAME
          conf.f.qh-lb.com
          conf.f.qh-lb.com
          IN A
          180.163.243.162
          conf.f.qh-lb.com
          IN A
          180.163.243.109
        • flag-us
          DNS
          conf.f.360.cn
          fastuserswitchingcompatibility
          Remote address:
          8.8.8.8:53
          Request
          conf.f.360.cn
          IN A
          Response
          conf.f.360.cn
          IN CNAME
          conf.f.qh-lb.com
          conf.f.qh-lb.com
          IN A
          1.192.193.145
          conf.f.qh-lb.com
          IN A
          180.163.243.119
        • 13.69.239.72:443
          322 B
          7
        • 8.8.8.8:53
          conf.f.360.cn
          dns
          fastuserswitchingcompatibility
          59 B
          121 B
          1
          1

          DNS Request

          conf.f.360.cn

          DNS Response

          180.163.243.162
          180.163.243.109

        • 8.8.8.8:53
          conf.f.360.cn
          dns
          fastuserswitchingcompatibility
          59 B
          121 B
          1
          1

          DNS Request

          conf.f.360.cn

          DNS Response

          1.192.193.145
          180.163.243.119

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Storm\update\%SESSIONNAME%\wqswi.cc3

          Filesize

          20.1MB

          MD5

          aaba66d49076e266996c42068785c378

          SHA1

          1be8143a56a4ed8b3c64d7af671ffd378f7d0402

          SHA256

          ed3698026625533f4fa6d8ed6d852a6a3ee59f7a7b9aaba42194f99c9c7803e8

          SHA512

          49693d52f9d6ae1f373c4ca6521e71b2e4c42a401815687f6342fee6b542c570e8698ec1568a8269abe799c64b438a9fd4f860574255aca2d644b6b913398447

        • C:\ProgramData\Storm\update\%SESSIONNAME%\wqswi.cc3

          Filesize

          20.1MB

          MD5

          aaba66d49076e266996c42068785c378

          SHA1

          1be8143a56a4ed8b3c64d7af671ffd378f7d0402

          SHA256

          ed3698026625533f4fa6d8ed6d852a6a3ee59f7a7b9aaba42194f99c9c7803e8

          SHA512

          49693d52f9d6ae1f373c4ca6521e71b2e4c42a401815687f6342fee6b542c570e8698ec1568a8269abe799c64b438a9fd4f860574255aca2d644b6b913398447

        • C:\ProgramData\Storm\update\%SESSIONNAME%\wqswi.cc3

          Filesize

          20.1MB

          MD5

          aaba66d49076e266996c42068785c378

          SHA1

          1be8143a56a4ed8b3c64d7af671ffd378f7d0402

          SHA256

          ed3698026625533f4fa6d8ed6d852a6a3ee59f7a7b9aaba42194f99c9c7803e8

          SHA512

          49693d52f9d6ae1f373c4ca6521e71b2e4c42a401815687f6342fee6b542c570e8698ec1568a8269abe799c64b438a9fd4f860574255aca2d644b6b913398447

        • C:\Users\Admin\AppData\Local\mtbehlyysp

          Filesize

          21.1MB

          MD5

          dee802797768520fc89fd7f8b0f25875

          SHA1

          b3bbecdabbcfcc4d3f035eb523ca4efd8da32c8c

          SHA256

          f34000a4027aa2af441cbc0adfda67c583ea4bd68ccac3719ddcfdd3936d7325

          SHA512

          09971d6332cc4253afc5948018e29c46055a3a10b56d69789476bd30c6d62d44eddac65174ddfae2c9181864f1badf60b09ae0a00d61cac5ccc38592f847a7e1

        • C:\Windows\SysWOW64\svchost.exe.txt

          Filesize

          204B

          MD5

          3c44b6ba35bd951f17d771985da3e709

          SHA1

          95f868357fd1cad9904fa505f01fc0774c194427

          SHA256

          ea16699778857d49e109660671eb8aada77304c075f176cd119dbda806fc3516

          SHA512

          18688e1950e1fbf42bbd4225943309545c11348fefe6a32394156987e4b7b3fe5a615f2c51ea8ec9f08cdd3f3e02e5e0700baaab1c197df589b2a04c8352b44c

        • C:\Windows\SysWOW64\svchost.exe.txt

          Filesize

          306B

          MD5

          43c0bc442da09a542e5523435e4f08d2

          SHA1

          029e8e1cb2341b54e0585c7043b65dafd52da7ec

          SHA256

          54f79886d42e6c6485eadd406f36020a772cad275d6991f322886d29c65f0e61

          SHA512

          79a2c4655f7d4c5a053aef141ba92444ee0c3c96bbb46a0d865a1b83a2a1961181ff19338e53b1c5601a5a668ffffc359770497c39be4378cf987aa2a44f3a4b

        • \??\c:\programdata\application data\storm\update\%sessionname%\wqswi.cc3

          Filesize

          20.1MB

          MD5

          aaba66d49076e266996c42068785c378

          SHA1

          1be8143a56a4ed8b3c64d7af671ffd378f7d0402

          SHA256

          ed3698026625533f4fa6d8ed6d852a6a3ee59f7a7b9aaba42194f99c9c7803e8

          SHA512

          49693d52f9d6ae1f373c4ca6521e71b2e4c42a401815687f6342fee6b542c570e8698ec1568a8269abe799c64b438a9fd4f860574255aca2d644b6b913398447

        • \??\c:\users\admin\appdata\local\mtbehlyysp

          Filesize

          21.1MB

          MD5

          dee802797768520fc89fd7f8b0f25875

          SHA1

          b3bbecdabbcfcc4d3f035eb523ca4efd8da32c8c

          SHA256

          f34000a4027aa2af441cbc0adfda67c583ea4bd68ccac3719ddcfdd3936d7325

          SHA512

          09971d6332cc4253afc5948018e29c46055a3a10b56d69789476bd30c6d62d44eddac65174ddfae2c9181864f1badf60b09ae0a00d61cac5ccc38592f847a7e1

        • memory/1932-133-0x0000000000400000-0x000000000044E364-memory.dmp

          Filesize

          312KB

        • memory/1932-132-0x0000000000400000-0x000000000044E364-memory.dmp

          Filesize

          312KB

        • memory/3440-138-0x0000000000400000-0x000000000044E364-memory.dmp

          Filesize

          312KB

        • memory/3440-141-0x0000000000400000-0x000000000044E364-memory.dmp

          Filesize

          312KB

        • memory/3440-137-0x0000000000400000-0x000000000044E364-memory.dmp

          Filesize

          312KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.