Overview
overview
10Static
static
10COMDLG32.dll
windows7-x64
1COMDLG32.dll
windows10-2004-x64
1MSADODC.dll
windows7-x64
1MSADODC.dll
windows10-2004-x64
1MSBIND.dll
windows7-x64
1MSBIND.dll
windows10-2004-x64
1MSCOMCT2.dll
windows7-x64
1MSCOMCT2.dll
windows10-2004-x64
1MSCOMCTL.dll
windows7-x64
1MSCOMCTL.dll
windows10-2004-x64
1MSDATGRD.dll
windows7-x64
1MSDATGRD.dll
windows10-2004-x64
1MSSTDFMT.dll
windows7-x64
1MSSTDFMT.dll
windows10-2004-x64
1MSWINSCK.dll
windows7-x64
1MSWINSCK.dll
windows10-2004-x64
1Readme-说明.htm
windows7-x64
1Readme-说明.htm
windows10-2004-x64
1jmail.dll
windows7-x64
1jmail.dll
windows10-2004-x64
1run.exe
windows7-x64
10run.exe
windows10-2004-x64
10yuren2008.exe
windows7-x64
yuren2008.exe
windows10-2004-x64
1Analysis
-
max time kernel
164s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:25
Behavioral task
behavioral1
Sample
COMDLG32.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
COMDLG32.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
MSADODC.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
MSADODC.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
MSBIND.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
MSBIND.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
MSCOMCT2.dll
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
MSCOMCT2.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
MSCOMCTL.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
MSCOMCTL.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
MSDATGRD.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
MSDATGRD.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
MSSTDFMT.dll
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
MSSTDFMT.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
MSWINSCK.dll
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
MSWINSCK.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
Readme-说明.htm
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Readme-说明.htm
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
jmail.dll
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
jmail.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
run.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
run.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
yuren2008.exe
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
yuren2008.exe
Resource
win10v2004-20221111-en
General
-
Target
run.exe
-
Size
107KB
-
MD5
9600799c1b9ef711c48967fe354ef57c
-
SHA1
10bbd5671d071c66e5a1c81d3f23b3be18d37f12
-
SHA256
1e8cb74780f21ae6c11504f04cf084acfc4ef6a73cfa12e3bb8ce423c55cdae3
-
SHA512
94037e08596bc60d8541b249a655b4aa16724727415a7672879699b29db0c70d1b3064cd20fd3cc50ae5ee2b1baf9d36b93b2f1f57a2afd5fcbbc2096210b1b3
-
SSDEEP
3072:Rt6XkomyxsPRRf9joJFWZCZ1UTpO2BAsq+Bxa/2CGwp4jqR:Rt6XkomyxsPDf5oJFWZUO82G57/2CGw5
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
Processes:
resource yara_rule behavioral21/memory/1004-55-0x0000000000400000-0x000000000041C000-memory.dmp family_gh0strat \Users\Admin\AppData\Local\Temp\7172910_ex.tmp family_gh0strat \Windows\SysWOW64\FastUserSwitchingCompatibilityapi.dll family_gh0strat \??\c:\windows\SysWOW64\fastuserswitchingcompatibilityapi.dll family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys svchost.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
run.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibilityapi.dll" run.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1912 svchost.exe -
Loads dropped DLL 2 IoCs
Processes:
run.exesvchost.exepid process 1004 run.exe 1912 svchost.exe -
Drops file in System32 directory 1 IoCs
Processes:
run.exedescription ioc process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibilityapi.dll run.exe -
Kills process with taskkill 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 592 taskkill.exe 540 taskkill.exe 1632 taskkill.exe 1852 taskkill.exe 1516 taskkill.exe 1740 taskkill.exe 1376 taskkill.exe 588 taskkill.exe 1068 taskkill.exe 1156 taskkill.exe 868 taskkill.exe 2040 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
run.exesvchost.exepid process 1004 run.exe 1004 run.exe 1004 run.exe 1004 run.exe 1004 run.exe 1912 svchost.exe 1912 svchost.exe 1912 svchost.exe 1912 svchost.exe 1912 svchost.exe 1912 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 588 taskkill.exe Token: SeDebugPrivilege 592 taskkill.exe Token: SeDebugPrivilege 1068 taskkill.exe Token: SeDebugPrivilege 868 taskkill.exe Token: SeDebugPrivilege 1156 taskkill.exe Token: SeDebugPrivilege 540 taskkill.exe Token: SeDebugPrivilege 2040 taskkill.exe Token: SeDebugPrivilege 1516 taskkill.exe Token: SeDebugPrivilege 1740 taskkill.exe Token: SeDebugPrivilege 1376 taskkill.exe Token: SeDebugPrivilege 1632 taskkill.exe Token: SeDebugPrivilege 1852 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
run.exedescription pid process target process PID 1004 wrote to memory of 592 1004 run.exe taskkill.exe PID 1004 wrote to memory of 592 1004 run.exe taskkill.exe PID 1004 wrote to memory of 592 1004 run.exe taskkill.exe PID 1004 wrote to memory of 592 1004 run.exe taskkill.exe PID 1004 wrote to memory of 592 1004 run.exe taskkill.exe PID 1004 wrote to memory of 592 1004 run.exe taskkill.exe PID 1004 wrote to memory of 592 1004 run.exe taskkill.exe PID 1004 wrote to memory of 588 1004 run.exe taskkill.exe PID 1004 wrote to memory of 588 1004 run.exe taskkill.exe PID 1004 wrote to memory of 588 1004 run.exe taskkill.exe PID 1004 wrote to memory of 588 1004 run.exe taskkill.exe PID 1004 wrote to memory of 588 1004 run.exe taskkill.exe PID 1004 wrote to memory of 588 1004 run.exe taskkill.exe PID 1004 wrote to memory of 588 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1068 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1068 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1068 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1068 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1068 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1068 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1068 1004 run.exe taskkill.exe PID 1004 wrote to memory of 540 1004 run.exe taskkill.exe PID 1004 wrote to memory of 540 1004 run.exe taskkill.exe PID 1004 wrote to memory of 540 1004 run.exe taskkill.exe PID 1004 wrote to memory of 540 1004 run.exe taskkill.exe PID 1004 wrote to memory of 540 1004 run.exe taskkill.exe PID 1004 wrote to memory of 540 1004 run.exe taskkill.exe PID 1004 wrote to memory of 540 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1156 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1156 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1156 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1156 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1156 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1156 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1156 1004 run.exe taskkill.exe PID 1004 wrote to memory of 868 1004 run.exe taskkill.exe PID 1004 wrote to memory of 868 1004 run.exe taskkill.exe PID 1004 wrote to memory of 868 1004 run.exe taskkill.exe PID 1004 wrote to memory of 868 1004 run.exe taskkill.exe PID 1004 wrote to memory of 868 1004 run.exe taskkill.exe PID 1004 wrote to memory of 868 1004 run.exe taskkill.exe PID 1004 wrote to memory of 868 1004 run.exe taskkill.exe PID 1004 wrote to memory of 2040 1004 run.exe taskkill.exe PID 1004 wrote to memory of 2040 1004 run.exe taskkill.exe PID 1004 wrote to memory of 2040 1004 run.exe taskkill.exe PID 1004 wrote to memory of 2040 1004 run.exe taskkill.exe PID 1004 wrote to memory of 2040 1004 run.exe taskkill.exe PID 1004 wrote to memory of 2040 1004 run.exe taskkill.exe PID 1004 wrote to memory of 2040 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1516 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1516 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1516 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1516 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1516 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1516 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1516 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1740 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1740 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1740 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1740 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1740 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1740 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1740 1004 run.exe taskkill.exe PID 1004 wrote to memory of 1632 1004 run.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\run.exe"C:\Users\Admin\AppData\Local\Temp\run.exe"1⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im RSTray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:592 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im safeboxTray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:588 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im 360tray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im knownsvr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:540 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im ras.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1156 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im SuperKiller.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:868 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im RSTray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im safeboxTray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1516 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im 360tray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im knownsvr.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im ras.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1376 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im SuperKiller.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Drops file in Drivers directory
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5f367dd4b6fc20d741cd21c6a2b80518b
SHA1baff0abc969bca0844b702e631abd9ceb19aff57
SHA256d00ebaa1008609f7d928cecf8b94177d068851242ba65e34e6a2870156039099
SHA512a9b3ad778140bbdba95dbcb43b908e4bd9ba1e6ec81504daa80fc7f8f9ca67284d215c6f22cf2bc8557e52f6578b706ddcb37d859b18cfffdeed9d56ede14df9
-
Filesize
94KB
MD5f374af232c26d1f0ec5abd91c96dd3ae
SHA1ad1e83c561619cef274036362b7f5200477bcd5d
SHA2561b4f8df782ebb60b7d2a4297fb12d72a06a1b9c5a80f7f3efd3c212d881e689a
SHA512ac76d90eb9656135b773a1fa43a39ea8b84916f6a6d484a215f33f278419b2e1427bc7ab57ed31df2abf169bf222a3acd6e7df1ad935beeb22c95404ec69c0d5
-
Filesize
94KB
MD5f367dd4b6fc20d741cd21c6a2b80518b
SHA1baff0abc969bca0844b702e631abd9ceb19aff57
SHA256d00ebaa1008609f7d928cecf8b94177d068851242ba65e34e6a2870156039099
SHA512a9b3ad778140bbdba95dbcb43b908e4bd9ba1e6ec81504daa80fc7f8f9ca67284d215c6f22cf2bc8557e52f6578b706ddcb37d859b18cfffdeed9d56ede14df9