Analysis

  • max time kernel
    122s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2022, 17:09

General

  • Target

    058944a26770fe4b060fea40a1e6c0e17c827fdfafe923fc1e71f79a9c957796.exe

  • Size

    184KB

  • MD5

    64a9f5490c661a2d937e74e8438ec410

  • SHA1

    c8575892bd4c444c41152812a1049ed6b0a2f386

  • SHA256

    058944a26770fe4b060fea40a1e6c0e17c827fdfafe923fc1e71f79a9c957796

  • SHA512

    2859ae77e78288d7ecddd22983f3629f3c88138192e850c50bb4d29223ea943f18daf8c1d50cef2a0b4525f551f75b37c7ff6b2335fa8607f3cf3391a7090c6a

  • SSDEEP

    3072:mtABk6WN1r8Vs6cYaOO/myZdZTX/WtuNs6G8uEea5IjX2mJoghtpmI+:GABk6WrVbm0XO9l8Xea5IjmmJZhtpmI

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\058944a26770fe4b060fea40a1e6c0e17c827fdfafe923fc1e71f79a9c957796.exe
    "C:\Users\Admin\AppData\Local\Temp\058944a26770fe4b060fea40a1e6c0e17c827fdfafe923fc1e71f79a9c957796.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1584
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\SysWOW64\ntfastuserswitchingcompatibility.dll

    Filesize

    148KB

    MD5

    d4cfcd376c24ff7d997b197468ce7c1d

    SHA1

    fcf2b2a8644136f4a54aef94c65ccb55e769c5b3

    SHA256

    c3546ac1a386cf62c1298e904deb813d889bb9aa2c85f8ec127785fe3dbece99

    SHA512

    0515186f2d0c684994a51f0506afd3972d4fb99bf2decd5ce702d922a7f7a859a039f7b5f23414977cac45b83377502b7f8d2cb45ec922e882bf42a82bb30938

  • \Windows\SysWOW64\ntfastuserswitchingcompatibility.dll

    Filesize

    148KB

    MD5

    d4cfcd376c24ff7d997b197468ce7c1d

    SHA1

    fcf2b2a8644136f4a54aef94c65ccb55e769c5b3

    SHA256

    c3546ac1a386cf62c1298e904deb813d889bb9aa2c85f8ec127785fe3dbece99

    SHA512

    0515186f2d0c684994a51f0506afd3972d4fb99bf2decd5ce702d922a7f7a859a039f7b5f23414977cac45b83377502b7f8d2cb45ec922e882bf42a82bb30938

  • memory/1584-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

    Filesize

    8KB