Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2022 03:45

General

  • Target

    18197dcff54112f37c0917fc3c33ccc82fcadf7c7cb3b735b4e5e9a3b8cd2e3d.exe

  • Size

    133KB

  • MD5

    4f9aeb9a6e05b7979cb0fad254da6df6

  • SHA1

    907b2001d213a0b657821c4cb9257e4d851fcf61

  • SHA256

    18197dcff54112f37c0917fc3c33ccc82fcadf7c7cb3b735b4e5e9a3b8cd2e3d

  • SHA512

    38f73e0a67bb53accff779cb0d89d24d80d589723e2200ecd3819c8e6d9f468bf4256bdb05b661ecfc769e2770e9475d710f3fa38e0205afbba5fdcc8d952ec0

  • SSDEEP

    3072:wgd4UOCGh9eqkQ9DM3Zxpdhj/W7j7FCw4nNooBzmAw8zfXyhDw:wORfa9gBQAw47BSEzfXKE

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 25 IoCs
  • Suspicious behavior: RenamesItself 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18197dcff54112f37c0917fc3c33ccc82fcadf7c7cb3b735b4e5e9a3b8cd2e3d.exe
    "C:\Users\Admin\AppData\Local\Temp\18197dcff54112f37c0917fc3c33ccc82fcadf7c7cb3b735b4e5e9a3b8cd2e3d.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\system32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\uszlafach.vbs" //B //Nologo
      2⤵
        PID:5100
    • C:\Windows\system32\wbem\scrcons.exe
      C:\Windows\system32\wbem\scrcons.exe -Embedding
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:4144
      • C:\WINDOWS\svchost.exe
        "C:\WINDOWS\svchost.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: RenamesItself
        • Suspicious use of WriteProcessMemory
        PID:4924
        • C:\Windows\SysWOW64\wscript.exe
          "C:\Windows\system32\wscript.exe" "C:\Windows\TEMP\marjbxzrmv.vbs" //B //Nologo
          3⤵
          • Modifies data under HKEY_USERS
          PID:3984

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\uszlafach.vbs

      Filesize

      1KB

      MD5

      b8f409f181634e11b66d599fc87a4b3a

      SHA1

      27944003671d53684adcfb48c9487793384f7ebb

      SHA256

      df79f53aec056ce4bbaafcb60a3dc5710337ec49f509b8faca86781d2dc267ae

      SHA512

      65dd9149e9e6ec0c0703ffb8142e18ded14f7d9b91a22789a9ce9b2bd68855ad027b9275ff9d2294d3757306a6e5945164d9d7f42eeb4eb73c8ca0ec60291b6a

    • C:\Windows\TEMP\marjbxzrmv.vbs

      Filesize

      1KB

      MD5

      b8f409f181634e11b66d599fc87a4b3a

      SHA1

      27944003671d53684adcfb48c9487793384f7ebb

      SHA256

      df79f53aec056ce4bbaafcb60a3dc5710337ec49f509b8faca86781d2dc267ae

      SHA512

      65dd9149e9e6ec0c0703ffb8142e18ded14f7d9b91a22789a9ce9b2bd68855ad027b9275ff9d2294d3757306a6e5945164d9d7f42eeb4eb73c8ca0ec60291b6a

    • C:\Windows\svchost.exe

      Filesize

      133KB

      MD5

      4f9aeb9a6e05b7979cb0fad254da6df6

      SHA1

      907b2001d213a0b657821c4cb9257e4d851fcf61

      SHA256

      18197dcff54112f37c0917fc3c33ccc82fcadf7c7cb3b735b4e5e9a3b8cd2e3d

      SHA512

      38f73e0a67bb53accff779cb0d89d24d80d589723e2200ecd3819c8e6d9f468bf4256bdb05b661ecfc769e2770e9475d710f3fa38e0205afbba5fdcc8d952ec0

    • memory/3984-138-0x0000000000000000-mapping.dmp

    • memory/4380-132-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4924-135-0x0000000000000000-mapping.dmp

    • memory/4924-137-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/5100-133-0x0000000000000000-mapping.dmp