Analysis

  • max time kernel
    151s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2022, 21:56

General

  • Target

    54afcb91af3d04b73b9e8f1db28ea507271e3a6043a744dfd75c3c292aeee451.exe

  • Size

    234KB

  • MD5

    0cc0773e8571e2d83f42f2ed0564c944

  • SHA1

    5098095532be0347ac07705797dd99dabf0e2b94

  • SHA256

    54afcb91af3d04b73b9e8f1db28ea507271e3a6043a744dfd75c3c292aeee451

  • SHA512

    5990dc1a598849b9acfee31e298124c10cbb4e8cfeaa7b9be04ec9cf1bf948d301275dae46acb280e0630f5128d379ac7aa0c0852521215cacdec5d3f706ce1e

  • SSDEEP

    3072:5ROtjvkiRfI0jZrgv7pSMqh9rjg461dsZk1xTTjBdCJtUogpgn/NitkHQ:6jkiRRWpSMqjg1TXCJVn/NU

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Blocklisted process makes network request 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54afcb91af3d04b73b9e8f1db28ea507271e3a6043a744dfd75c3c292aeee451.exe
    "C:\Users\Admin\AppData\Local\Temp\54afcb91af3d04b73b9e8f1db28ea507271e3a6043a744dfd75c3c292aeee451.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\54afcb91af3d04b73b9e8f1db28ea507271e3a6043a744dfd75c3c292aeee451.exe
      C:\Users\Admin\AppData\Local\Temp\54afcb91af3d04b73b9e8f1db28ea507271e3a6043a744dfd75c3c292aeee451.exe
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c rundll32.exe C:\Windows\linkinfo.dll hi
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Windows\linkinfo.dll hi
          4⤵
          • Blocklisted process makes network request
          • Deletes itself
          • Suspicious behavior: GetForegroundWindowSpam
          PID:1488

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\linkinfo.dll

    Filesize

    118KB

    MD5

    817eacab620b8fde07a5ac68d1a66310

    SHA1

    dc5c4c41a361d9a249b481a7584a8926f2fd04bb

    SHA256

    19c738ba12303926f6b00a7b791676fff2d24bfcab1c958c3ee56292bfa97d9e

    SHA512

    53e42ae391632f403624187997c1f680e3c5a05d1dcc77010281ea9ccc8bd687cfc8dee068bb1532e436155f827271724cdea0ec3b4abd9b2753b13d36683bf1

  • memory/1188-58-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1388-54-0x0000000075711000-0x0000000075713000-memory.dmp

    Filesize

    8KB

  • memory/1388-62-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1388-63-0x0000000000220000-0x000000000025C000-memory.dmp

    Filesize

    240KB

  • memory/1488-64-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/1488-65-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB