Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2022 17:19

General

  • Target

    a3e13cca212a128196d179e2cabff48c45e8ac9139fb2288cbdc11901cbec4bb.exe

  • Size

    131KB

  • MD5

    132521e6203dbcbf830c1dde49b35581

  • SHA1

    d9f1508c6a25f8b419e509e6e98a4ac3aec9227a

  • SHA256

    a3e13cca212a128196d179e2cabff48c45e8ac9139fb2288cbdc11901cbec4bb

  • SHA512

    8c43617b5b910db7cbed4bdd50e635d04e2406a29829292583a803f8d6574144eddd9d6fa67b91df9c0b4a338113e2bf8b2324f9c374b9760cfd09b2135db1a9

  • SSDEEP

    3072:gu+/qlgByBTEur7VsuRh/DBiE/8bNJFXDccx+tJdnJ0:g5DyBTE0V1LDw5N3TccqJdnJ0

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3e13cca212a128196d179e2cabff48c45e8ac9139fb2288cbdc11901cbec4bb.exe
    "C:\Users\Admin\AppData\Local\Temp\a3e13cca212a128196d179e2cabff48c45e8ac9139fb2288cbdc11901cbec4bb.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Drops file in System32 directory
    PID:3352
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
      PID:480

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/480-134-0x0000022FD4F60000-0x0000022FD4F70000-memory.dmp

      Filesize

      64KB

    • memory/480-135-0x0000022FD5960000-0x0000022FD5970000-memory.dmp

      Filesize

      64KB

    • memory/480-136-0x0000022FD7EE0000-0x0000022FD7EE4000-memory.dmp

      Filesize

      16KB

    • memory/480-137-0x0000022FD81A0000-0x0000022FD81A4000-memory.dmp

      Filesize

      16KB

    • memory/480-138-0x0000022FD7F10000-0x0000022FD7F14000-memory.dmp

      Filesize

      16KB

    • memory/480-139-0x0000022FD7F00000-0x0000022FD7F04000-memory.dmp

      Filesize

      16KB

    • memory/3352-132-0x0000000000400000-0x0000000000420040-memory.dmp

      Filesize

      128KB

    • memory/3352-133-0x0000000000400000-0x0000000000420040-memory.dmp

      Filesize

      128KB