Analysis

  • max time kernel
    134s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 05:51

General

  • Target

    acba7be5d97ab5945782666e4b9379775b483d67fd6451b6dabac3ddf6a9e02a.exe

  • Size

    152KB

  • MD5

    553704745f569ee423914de4067db62a

  • SHA1

    c5cc3b31d96851ca2402cce1aa0da5764af2d1a3

  • SHA256

    acba7be5d97ab5945782666e4b9379775b483d67fd6451b6dabac3ddf6a9e02a

  • SHA512

    e5146f98621c8c2ff84468c650e2d07bcc57a171e1bd99e28381ae2e0af23e6080cbde91455be1fb233a3c833d3e7a33944c40717ce2bf54aea8dc4302118a3a

  • SSDEEP

    3072:LwF8T0PAmr9B4NgVjGt1rOikGML7oCmFZKnbmLLLUZ:8FCqxB4Ng9GLjcoCmFJLXUZ

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Blocklisted process makes network request 5 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acba7be5d97ab5945782666e4b9379775b483d67fd6451b6dabac3ddf6a9e02a.exe
    "C:\Users\Admin\AppData\Local\Temp\acba7be5d97ab5945782666e4b9379775b483d67fd6451b6dabac3ddf6a9e02a.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\acba7be5d97ab5945782666e4b9379775b483d67fd6451b6dabac3ddf6a9e02a.exe"
      2⤵
        PID:3184
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "hiuoak27hbzkla"
      1⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe c:\windows\system32\mte56edd0m.dll, slexp
        2⤵
        • Blocklisted process makes network request
        • Sets file execution options in registry
        • Loads dropped DLL
        • Modifies data under HKEY_USERS
        PID:8

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    2
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\mte56edd0m.dll
      Filesize

      134KB

      MD5

      0b935e31b86356120d0f5dc83acda5d4

      SHA1

      e6de4855dff47032b3c4001faf4be42895e1d079

      SHA256

      f20beefbc2cad2e8c3826b5201e4451c5384d39fbb107d854cf4cfe22a170b37

      SHA512

      037bdebee74a02cde79c977d399a8ece588c525934b837e2b3c644203b6bdfd90197a00ff5326d86b1d416ff29dcdac933e0e0259bbae712e9c1265ea87eadb0

    • C:\Windows\SysWOW64\mte56edd0m.dll
      Filesize

      134KB

      MD5

      0b935e31b86356120d0f5dc83acda5d4

      SHA1

      e6de4855dff47032b3c4001faf4be42895e1d079

      SHA256

      f20beefbc2cad2e8c3826b5201e4451c5384d39fbb107d854cf4cfe22a170b37

      SHA512

      037bdebee74a02cde79c977d399a8ece588c525934b837e2b3c644203b6bdfd90197a00ff5326d86b1d416ff29dcdac933e0e0259bbae712e9c1265ea87eadb0

    • C:\Windows\SysWOW64\mte56edd0m.dll
      Filesize

      134KB

      MD5

      0b935e31b86356120d0f5dc83acda5d4

      SHA1

      e6de4855dff47032b3c4001faf4be42895e1d079

      SHA256

      f20beefbc2cad2e8c3826b5201e4451c5384d39fbb107d854cf4cfe22a170b37

      SHA512

      037bdebee74a02cde79c977d399a8ece588c525934b837e2b3c644203b6bdfd90197a00ff5326d86b1d416ff29dcdac933e0e0259bbae712e9c1265ea87eadb0

    • \??\c:\windows\SysWOW64\mte56edd0m.dll
      Filesize

      134KB

      MD5

      0b935e31b86356120d0f5dc83acda5d4

      SHA1

      e6de4855dff47032b3c4001faf4be42895e1d079

      SHA256

      f20beefbc2cad2e8c3826b5201e4451c5384d39fbb107d854cf4cfe22a170b37

      SHA512

      037bdebee74a02cde79c977d399a8ece588c525934b837e2b3c644203b6bdfd90197a00ff5326d86b1d416ff29dcdac933e0e0259bbae712e9c1265ea87eadb0

    • memory/8-136-0x0000000000000000-mapping.dmp
    • memory/3184-135-0x0000000000000000-mapping.dmp