Analysis

  • max time kernel
    152s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 16:13

General

  • Target

    cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe

  • Size

    108KB

  • MD5

    1504dfe8b0ea4fafd3f715543f166450

  • SHA1

    5d54d4bf23a7f2b2ba5711807b234ac77df62761

  • SHA256

    cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c

  • SHA512

    4cbad4ce15ef265d1d5c8fa042c79b633d08174db9fdbd847a089b269d1dcc32fa6f57fbaf39a8afc5562092a32c199d1366d08d2d5fc51d27ef75225477f709

  • SSDEEP

    3072:JMWQSyGtNZVqFEbYJutd8SVOR+adwbdTw+KBZF/XA:JMWQSyGJVqFGYktGD+6sdw+6r/w

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe
    "C:\Users\Admin\AppData\Local\Temp\cca9595e866a21f13b53f30d3409f5399b7ef76f5f3174c983a61bda9497e45c.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /t /im RSTray.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4064
  • C:\Windows\SysWOW64\SVCHOST.EXE
    C:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS -s FastUserSwitchingCompatibility
    1⤵
    • Loads dropped DLL
    PID:5080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\FastUserSwitchingCompatibility360.dll

    Filesize

    96KB

    MD5

    4a5fff2d7f3f4252ea6b63970538385b

    SHA1

    28d4de211be989ebf511c0106e700afeb9469445

    SHA256

    aa44e79d9847968cad0309fbaa86b387d294af2a09bf113338c1f87df66773dd

    SHA512

    67d52e6454aad62e64a6dda8540ca8c8917a71ba0e901b4dfddeec2fc2abfbe9b700cb9c56522bd263752c6d924b299a133afbd3609981540e95b2a58807ffaa

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility360.dll

    Filesize

    96KB

    MD5

    4a5fff2d7f3f4252ea6b63970538385b

    SHA1

    28d4de211be989ebf511c0106e700afeb9469445

    SHA256

    aa44e79d9847968cad0309fbaa86b387d294af2a09bf113338c1f87df66773dd

    SHA512

    67d52e6454aad62e64a6dda8540ca8c8917a71ba0e901b4dfddeec2fc2abfbe9b700cb9c56522bd263752c6d924b299a133afbd3609981540e95b2a58807ffaa

  • memory/2260-132-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2260-135-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/5080-137-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/5080-138-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB