Analysis

  • max time kernel
    51s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 07:32

General

  • Target

    86069f6db690f1dfe07337094eadb26a0a800bec3d163918acb7a1c8fcaedfaf.exe

  • Size

    85KB

  • MD5

    154e2a0b6507b8c39bc9e99f67f05cb2

  • SHA1

    24d2b050306ec30a29f71828fdfdb1e40fde954d

  • SHA256

    86069f6db690f1dfe07337094eadb26a0a800bec3d163918acb7a1c8fcaedfaf

  • SHA512

    f5b0efd13c3f8cc75a7897626d5b1f765fd9798422df62281578d730d57ceadff65b13812a407659f15abac17bb7041ea5138cabc54cef65404b52c4f071d79e

  • SSDEEP

    1536:fRu2kaSMrv+B3ZNWSM6HJy3fBpongA6pvA/Cme4u3AoNZvEEp:fXSsvESj3ongA6pvAKb4u3R

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86069f6db690f1dfe07337094eadb26a0a800bec3d163918acb7a1c8fcaedfaf.exe
    "C:\Users\Admin\AppData\Local\Temp\86069f6db690f1dfe07337094eadb26a0a800bec3d163918acb7a1c8fcaedfaf.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Windows\SysWOW64\net.exe
      net start "Task Scheduler"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 start "Task Scheduler"
        3⤵
          PID:1532

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1072-62-0x0000000000000000-mapping.dmp
    • memory/1516-54-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1516-55-0x0000000075841000-0x0000000075843000-memory.dmp
      Filesize

      8KB

    • memory/1516-56-0x0000000000020000-0x000000000002A000-memory.dmp
      Filesize

      40KB

    • memory/1516-57-0x0000000010000000-0x0000000010046000-memory.dmp
      Filesize

      280KB

    • memory/1516-59-0x0000000010000000-0x0000000010046000-memory.dmp
      Filesize

      280KB

    • memory/1516-61-0x0000000010000000-0x0000000010046000-memory.dmp
      Filesize

      280KB

    • memory/1516-64-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1516-65-0x0000000000020000-0x000000000002A000-memory.dmp
      Filesize

      40KB

    • memory/1532-63-0x0000000000000000-mapping.dmp