Analysis

  • max time kernel
    150s
  • max time network
    60s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:05

General

  • Target

    a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f.exe

  • Size

    121KB

  • MD5

    6e99d55e2249e0ec6af52ef986fa0e1d

  • SHA1

    d91a7646204ef1491c756ca59085327eda43c949

  • SHA256

    a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

  • SHA512

    0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

  • SSDEEP

    3072:zWPi626T8Md/8I64gsHaARfVrhz9gz0BcjMJHXHiU:zWPruq6a7azQhHXCU

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 41 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 21 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 26 IoCs
  • Suspicious behavior: RenamesItself 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f.exe
    "C:\Users\Admin\AppData\Local\Temp\a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\system32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\knrakuyi.vbs" //B //Nologo
      2⤵
        PID:1572
    • C:\Windows\system32\wbem\scrcons.exe
      C:\Windows\system32\wbem\scrcons.exe -Embedding
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Windows\F12EC64F.exe
        "C:\Windows\F12EC64F.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: RenamesItself
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Windows\SysWOW64\wscript.exe
          "C:\Windows\system32\wscript.exe" "C:\Windows\TEMP\bthsczdt.vbs" //B //Nologo
          3⤵
          • Modifies data under HKEY_USERS
          PID:304
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1756
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1940
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:580
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1600
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:2040
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:952
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1776
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1152
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1984
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1820
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1956
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:584
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1768
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1064
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1464
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1304
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1940
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:328
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:1576
      • C:\Windows\7644A38A.exe
        "C:\Windows\7644A38A.exe"
        2⤵
        • Executes dropped EXE
        PID:576

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\knrakuyi.vbs

      Filesize

      1KB

      MD5

      ac35822986823dceaff37c32bcebc935

      SHA1

      e297ee5245d1af650b96aafa418e23119c5827b4

      SHA256

      40f6c07bc73c286c6c161155b49d8b94336d370c0fc747dc5fcc47b4f024b976

      SHA512

      66f04896ac4b0b96e13b5faa6edcc91e30aab4f0190e8bcdb1a84574974c0232bee65086265a68d6fdc2ef8df56c2e6af03604aa6bf89989b838f1d24235a89f

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\7644A38A.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\F12EC64F.exe

      Filesize

      121KB

      MD5

      6e99d55e2249e0ec6af52ef986fa0e1d

      SHA1

      d91a7646204ef1491c756ca59085327eda43c949

      SHA256

      a670246a5fb7dbf85af274909888b4db24a0fe7460ddc39c412ca128fdeb625f

      SHA512

      0ea3be72025a7a7799ace2a42432418dae44a2c4b40548bc573d3f52504ae1a99db97ff0b2fb6fa200dcc8d5b44ec3c580dd4627978a2ae982e8ea65083ce37e

    • C:\Windows\TEMP\bthsczdt.vbs

      Filesize

      1KB

      MD5

      affe92b93bbd1a15762532f1d47d264e

      SHA1

      a18aabce1a414d598fe8d732e64202596b9c867c

      SHA256

      8871080bc44a687131c4ce38912a5addd1061f9a2c38a14beeac20fb9bc6964e

      SHA512

      e9306b7d8147c83d508058c47d2e85be8c680168f5b5d3d9f2d1774d347af416c3dbc2fd0df1a7b0f01cc99eb71e2886c0bbca24238c5f53142e7ca116e84eb9

    • memory/304-65-0x0000000000000000-mapping.dmp

    • memory/328-134-0x0000000000000000-mapping.dmp

    • memory/328-137-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/576-142-0x0000000000000000-mapping.dmp

    • memory/580-77-0x0000000000000000-mapping.dmp

    • memory/580-80-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/584-113-0x0000000000000000-mapping.dmp

    • memory/836-60-0x000007FEFBE11000-0x000007FEFBE13000-memory.dmp

      Filesize

      8KB

    • memory/860-72-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/860-64-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/860-61-0x0000000000000000-mapping.dmp

    • memory/952-89-0x0000000000000000-mapping.dmp

    • memory/952-92-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1064-120-0x0000000000000000-mapping.dmp

    • memory/1064-123-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1152-100-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1152-97-0x0000000000000000-mapping.dmp

    • memory/1304-128-0x0000000000000000-mapping.dmp

    • memory/1464-127-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1464-124-0x0000000000000000-mapping.dmp

    • memory/1572-56-0x0000000000000000-mapping.dmp

    • memory/1576-141-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1576-138-0x0000000000000000-mapping.dmp

    • memory/1600-84-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1600-81-0x0000000000000000-mapping.dmp

    • memory/1652-55-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1652-59-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1652-54-0x00000000758C1000-0x00000000758C3000-memory.dmp

      Filesize

      8KB

    • memory/1756-71-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1756-68-0x0000000000000000-mapping.dmp

    • memory/1768-116-0x0000000000000000-mapping.dmp

    • memory/1768-119-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1776-93-0x0000000000000000-mapping.dmp

    • memory/1776-96-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1820-105-0x0000000000000000-mapping.dmp

    • memory/1820-108-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1940-131-0x0000000000000000-mapping.dmp

    • memory/1940-76-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1940-73-0x0000000000000000-mapping.dmp

    • memory/1956-112-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/1956-109-0x0000000000000000-mapping.dmp

    • memory/1984-101-0x0000000000000000-mapping.dmp

    • memory/1984-104-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2040-85-0x0000000000000000-mapping.dmp

    • memory/2040-88-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB