Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 16:43

General

  • Target

    fd910b89c0936361cb82b3f81749306237fec8cb219d7e91f0f065d35e93e102.exe

  • Size

    304KB

  • MD5

    9656fbbb87a33ff94613d537b0fdcee6

  • SHA1

    cf4893d87534915c1977e3a320fac06e105b40d4

  • SHA256

    fd910b89c0936361cb82b3f81749306237fec8cb219d7e91f0f065d35e93e102

  • SHA512

    0704b078607cd0a9972014fd8a25ac865edc60ee11a40787db343cb5ae00ceb4c301973e1b468e0fb738c28dee59a9a9041f1dba0aa1d52cf95353af8085960c

  • SSDEEP

    6144:o2Rnh5EsZm2E47RNYQRRV3A4G7UqqULirkT01:oeh5EsZY4dNPDCIrkw

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd910b89c0936361cb82b3f81749306237fec8cb219d7e91f0f065d35e93e102.exe
    "C:\Users\Admin\AppData\Local\Temp\fd910b89c0936361cb82b3f81749306237fec8cb219d7e91f0f065d35e93e102.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\V2011\360UI.exe
      C:\Users\Admin\AppData\Local\Temp\V2011\360UI.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:4876
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c afc9fe2f418b00a0.bat
      2⤵
        PID:2808

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\V2011\360UI.exe

      Filesize

      304KB

      MD5

      6b79052ac42892f4fdfc9a10c4ac73e0

      SHA1

      4b139bd4ca680256533592431307e942923bdcd8

      SHA256

      f457bfe1b53e8654ba42a5d0e0a2cc43ba6267a5a92413d8604a6bebffd804cc

      SHA512

      6e32868d55f163baf0f005cf3a54e19d7e82a2af7fa7cfe81f31caba797a39483ce4b5019e7a9913e279d823fbdb80bf0e5b1acd3586977fb85131b80e70f510

    • C:\Users\Admin\AppData\Local\Temp\V2011\360UI.exe

      Filesize

      304KB

      MD5

      6b79052ac42892f4fdfc9a10c4ac73e0

      SHA1

      4b139bd4ca680256533592431307e942923bdcd8

      SHA256

      f457bfe1b53e8654ba42a5d0e0a2cc43ba6267a5a92413d8604a6bebffd804cc

      SHA512

      6e32868d55f163baf0f005cf3a54e19d7e82a2af7fa7cfe81f31caba797a39483ce4b5019e7a9913e279d823fbdb80bf0e5b1acd3586977fb85131b80e70f510

    • C:\Users\Admin\AppData\Local\Temp\afc9fe2f418b00a0.bat

      Filesize

      2KB

      MD5

      531a4d208a156e2219b870c24fb9c5b2

      SHA1

      32a3d8fa01420d73709ba941503598a83a4f680d

      SHA256

      c998581262cce92a1e40b8492fe8fb635fcd0985aa8f6960e599af1397f9326c

      SHA512

      7057a2c562fbe7c7d5385784e3d757e5de5d3e1d358db43e96a896a4daecebeb292830e32285f44a2b94a094c633d7327f7ca86075b2cafe65c6783f7268ac8c