Analysis

  • max time kernel
    151s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 15:29

General

  • Target

    3e1fd8fc235595bfcf42c47980616dc73b3e046cb8e47e1b518fcc79e34a7ba2.exe

  • Size

    280KB

  • MD5

    a4e5787613503c79d51ccd921ef47fa4

  • SHA1

    f3a3b5a54aa6243bf7cf518daecbc1662c355cdf

  • SHA256

    3e1fd8fc235595bfcf42c47980616dc73b3e046cb8e47e1b518fcc79e34a7ba2

  • SHA512

    15ef18c7c324451ed24b6f0d3dcb7d3c41019471a04c1d16577f80d41869f78173d70879b537a646f49b0b49adbbda8e0b46e5a7a1a49fda0d32f641ae9bd193

  • SSDEEP

    6144:VR2zrtk4tfVryzVnnmt/cIl9qswB9bJ6dWbnziPcE1kQnd9frAALaFlez:Ontk45oJmt/cI6sAN0WC0zQndFrLky

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 19 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e1fd8fc235595bfcf42c47980616dc73b3e046cb8e47e1b518fcc79e34a7ba2.exe
    "C:\Users\Admin\AppData\Local\Temp\3e1fd8fc235595bfcf42c47980616dc73b3e046cb8e47e1b518fcc79e34a7ba2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\rtad.exe
      "C:\Users\Admin\AppData\Local\Temp\rtad.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2044
    • C:\Users\Admin\AppData\Local\Temp\BaiBi.exe
      "C:\Users\Admin\AppData\Local\Temp\BaiBi.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Users\Admin\AppData\Local\Temp\Thunder.exe
        "C:\Users\Admin\AppData\Local\Temp\Thunder.exe"
        3⤵
        • Executes dropped EXE
        • Sets DLL path for service in the registry
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:320
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k hf6bHHXF
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe c:\windows\system32\kcmlve.pic,main hf6bHHXF
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:892
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k hf6bHHXF
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe c:\windows\system32\kcmlve.pic,main hf6bHHXF
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:692

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\BaiBi.exe

          Filesize

          218KB

          MD5

          4eb9c6c640cbb8c0bab63577a3e973b8

          SHA1

          9b567e2048880c09a71cf04e07c875f7a8fa59f9

          SHA256

          ab9026054b08e87a3c35e1524d9a74477906d077642a2122b5cac3c9f0172099

          SHA512

          eeeeef74bc7d0d2d3bc3a0280ae4d3912d97c0a20a59341c6f15fcf543a5ec2a3350cc9f83e8aa5e0172caa20586c4ba9e541c56545206433ed35d46e2146925

        • C:\Users\Admin\AppData\Local\Temp\BaiBi.exe

          Filesize

          218KB

          MD5

          4eb9c6c640cbb8c0bab63577a3e973b8

          SHA1

          9b567e2048880c09a71cf04e07c875f7a8fa59f9

          SHA256

          ab9026054b08e87a3c35e1524d9a74477906d077642a2122b5cac3c9f0172099

          SHA512

          eeeeef74bc7d0d2d3bc3a0280ae4d3912d97c0a20a59341c6f15fcf543a5ec2a3350cc9f83e8aa5e0172caa20586c4ba9e541c56545206433ed35d46e2146925

        • C:\Users\Admin\AppData\Local\Temp\Thunder.exe

          Filesize

          5.1MB

          MD5

          a3d802c99ceaa1128c90c8e95ad5c5f7

          SHA1

          fc89e9caa359932c1619f85f41b7173ce40f97a1

          SHA256

          c98c6221ceddff74f56bfe5aa13012477e255aec482542ea041e1278ccd852e4

          SHA512

          dbacefbc6f4249f180a88a6f35e6dd3f11161be34a953a95d01241dc62eafa29399c89de0b93db9cccf667efc8077728d925a4fbc0be42f57de07774482685d3

        • C:\Users\Admin\AppData\Local\Temp\Thunder.exe

          Filesize

          5.1MB

          MD5

          a3d802c99ceaa1128c90c8e95ad5c5f7

          SHA1

          fc89e9caa359932c1619f85f41b7173ce40f97a1

          SHA256

          c98c6221ceddff74f56bfe5aa13012477e255aec482542ea041e1278ccd852e4

          SHA512

          dbacefbc6f4249f180a88a6f35e6dd3f11161be34a953a95d01241dc62eafa29399c89de0b93db9cccf667efc8077728d925a4fbc0be42f57de07774482685d3

        • C:\Users\Admin\AppData\Local\Temp\rtad.exe

          Filesize

          62KB

          MD5

          950219f287ae876fbfdcc931b103dfe9

          SHA1

          65715d90dc12e821e7bf435280bcc0456558b2e9

          SHA256

          ddb824c8dba664ced8d1e085ad454d87cc0598df25cbf01d58c756ecadf921cc

          SHA512

          32c16ac8eea0e56911f22bcfaf136def39fbf9724dc39d803702a47493a2273ed09f2cce029e3f1fc12d79309c208e81f8c93507af90e5f26cd1ce7d6bf76b29

        • C:\Users\Admin\AppData\Local\Temp\rtad.exe

          Filesize

          62KB

          MD5

          950219f287ae876fbfdcc931b103dfe9

          SHA1

          65715d90dc12e821e7bf435280bcc0456558b2e9

          SHA256

          ddb824c8dba664ced8d1e085ad454d87cc0598df25cbf01d58c756ecadf921cc

          SHA512

          32c16ac8eea0e56911f22bcfaf136def39fbf9724dc39d803702a47493a2273ed09f2cce029e3f1fc12d79309c208e81f8c93507af90e5f26cd1ce7d6bf76b29

        • \??\c:\windows\SysWOW64\kcmlve.pic

          Filesize

          55.1MB

          MD5

          346a77ad8fdda1baa7e0d6fe51e94ad8

          SHA1

          cbc5b036c3a7c091c307dbc7324827b8b69c4454

          SHA256

          46e9bc4b448ebc14c8c4bb226ef088850497822f9c6dd5b1486d33c82379cad5

          SHA512

          c0b4104cda2416989ee99cc0732de5a1f53d3a6e5ad257e53d217f31f799d518bc66b1603b8ad9b9c8bd7334155dd8f4657ae453780a668dcfe274874389db4b

        • \Users\Admin\AppData\Local\Temp\BaiBi.exe

          Filesize

          218KB

          MD5

          4eb9c6c640cbb8c0bab63577a3e973b8

          SHA1

          9b567e2048880c09a71cf04e07c875f7a8fa59f9

          SHA256

          ab9026054b08e87a3c35e1524d9a74477906d077642a2122b5cac3c9f0172099

          SHA512

          eeeeef74bc7d0d2d3bc3a0280ae4d3912d97c0a20a59341c6f15fcf543a5ec2a3350cc9f83e8aa5e0172caa20586c4ba9e541c56545206433ed35d46e2146925

        • \Users\Admin\AppData\Local\Temp\BaiBi.exe

          Filesize

          218KB

          MD5

          4eb9c6c640cbb8c0bab63577a3e973b8

          SHA1

          9b567e2048880c09a71cf04e07c875f7a8fa59f9

          SHA256

          ab9026054b08e87a3c35e1524d9a74477906d077642a2122b5cac3c9f0172099

          SHA512

          eeeeef74bc7d0d2d3bc3a0280ae4d3912d97c0a20a59341c6f15fcf543a5ec2a3350cc9f83e8aa5e0172caa20586c4ba9e541c56545206433ed35d46e2146925

        • \Users\Admin\AppData\Local\Temp\BaiBi.exe

          Filesize

          218KB

          MD5

          4eb9c6c640cbb8c0bab63577a3e973b8

          SHA1

          9b567e2048880c09a71cf04e07c875f7a8fa59f9

          SHA256

          ab9026054b08e87a3c35e1524d9a74477906d077642a2122b5cac3c9f0172099

          SHA512

          eeeeef74bc7d0d2d3bc3a0280ae4d3912d97c0a20a59341c6f15fcf543a5ec2a3350cc9f83e8aa5e0172caa20586c4ba9e541c56545206433ed35d46e2146925

        • \Users\Admin\AppData\Local\Temp\BaiBi.exe

          Filesize

          218KB

          MD5

          4eb9c6c640cbb8c0bab63577a3e973b8

          SHA1

          9b567e2048880c09a71cf04e07c875f7a8fa59f9

          SHA256

          ab9026054b08e87a3c35e1524d9a74477906d077642a2122b5cac3c9f0172099

          SHA512

          eeeeef74bc7d0d2d3bc3a0280ae4d3912d97c0a20a59341c6f15fcf543a5ec2a3350cc9f83e8aa5e0172caa20586c4ba9e541c56545206433ed35d46e2146925

        • \Users\Admin\AppData\Local\Temp\BaiBi.exe

          Filesize

          218KB

          MD5

          4eb9c6c640cbb8c0bab63577a3e973b8

          SHA1

          9b567e2048880c09a71cf04e07c875f7a8fa59f9

          SHA256

          ab9026054b08e87a3c35e1524d9a74477906d077642a2122b5cac3c9f0172099

          SHA512

          eeeeef74bc7d0d2d3bc3a0280ae4d3912d97c0a20a59341c6f15fcf543a5ec2a3350cc9f83e8aa5e0172caa20586c4ba9e541c56545206433ed35d46e2146925

        • \Users\Admin\AppData\Local\Temp\Thunder.exe

          Filesize

          5.1MB

          MD5

          a3d802c99ceaa1128c90c8e95ad5c5f7

          SHA1

          fc89e9caa359932c1619f85f41b7173ce40f97a1

          SHA256

          c98c6221ceddff74f56bfe5aa13012477e255aec482542ea041e1278ccd852e4

          SHA512

          dbacefbc6f4249f180a88a6f35e6dd3f11161be34a953a95d01241dc62eafa29399c89de0b93db9cccf667efc8077728d925a4fbc0be42f57de07774482685d3

        • \Users\Admin\AppData\Local\Temp\Thunder.exe

          Filesize

          5.1MB

          MD5

          a3d802c99ceaa1128c90c8e95ad5c5f7

          SHA1

          fc89e9caa359932c1619f85f41b7173ce40f97a1

          SHA256

          c98c6221ceddff74f56bfe5aa13012477e255aec482542ea041e1278ccd852e4

          SHA512

          dbacefbc6f4249f180a88a6f35e6dd3f11161be34a953a95d01241dc62eafa29399c89de0b93db9cccf667efc8077728d925a4fbc0be42f57de07774482685d3

        • \Users\Admin\AppData\Local\Temp\Thunder.exe

          Filesize

          5.1MB

          MD5

          a3d802c99ceaa1128c90c8e95ad5c5f7

          SHA1

          fc89e9caa359932c1619f85f41b7173ce40f97a1

          SHA256

          c98c6221ceddff74f56bfe5aa13012477e255aec482542ea041e1278ccd852e4

          SHA512

          dbacefbc6f4249f180a88a6f35e6dd3f11161be34a953a95d01241dc62eafa29399c89de0b93db9cccf667efc8077728d925a4fbc0be42f57de07774482685d3

        • \Users\Admin\AppData\Local\Temp\Thunder.exe

          Filesize

          5.1MB

          MD5

          a3d802c99ceaa1128c90c8e95ad5c5f7

          SHA1

          fc89e9caa359932c1619f85f41b7173ce40f97a1

          SHA256

          c98c6221ceddff74f56bfe5aa13012477e255aec482542ea041e1278ccd852e4

          SHA512

          dbacefbc6f4249f180a88a6f35e6dd3f11161be34a953a95d01241dc62eafa29399c89de0b93db9cccf667efc8077728d925a4fbc0be42f57de07774482685d3

        • \Users\Admin\AppData\Local\Temp\Thunder.exe

          Filesize

          5.1MB

          MD5

          a3d802c99ceaa1128c90c8e95ad5c5f7

          SHA1

          fc89e9caa359932c1619f85f41b7173ce40f97a1

          SHA256

          c98c6221ceddff74f56bfe5aa13012477e255aec482542ea041e1278ccd852e4

          SHA512

          dbacefbc6f4249f180a88a6f35e6dd3f11161be34a953a95d01241dc62eafa29399c89de0b93db9cccf667efc8077728d925a4fbc0be42f57de07774482685d3

        • \Users\Admin\AppData\Local\Temp\rtad.exe

          Filesize

          62KB

          MD5

          950219f287ae876fbfdcc931b103dfe9

          SHA1

          65715d90dc12e821e7bf435280bcc0456558b2e9

          SHA256

          ddb824c8dba664ced8d1e085ad454d87cc0598df25cbf01d58c756ecadf921cc

          SHA512

          32c16ac8eea0e56911f22bcfaf136def39fbf9724dc39d803702a47493a2273ed09f2cce029e3f1fc12d79309c208e81f8c93507af90e5f26cd1ce7d6bf76b29

        • \Users\Admin\AppData\Local\Temp\rtad.exe

          Filesize

          62KB

          MD5

          950219f287ae876fbfdcc931b103dfe9

          SHA1

          65715d90dc12e821e7bf435280bcc0456558b2e9

          SHA256

          ddb824c8dba664ced8d1e085ad454d87cc0598df25cbf01d58c756ecadf921cc

          SHA512

          32c16ac8eea0e56911f22bcfaf136def39fbf9724dc39d803702a47493a2273ed09f2cce029e3f1fc12d79309c208e81f8c93507af90e5f26cd1ce7d6bf76b29

        • \Users\Admin\AppData\Local\Temp\rtad.exe

          Filesize

          62KB

          MD5

          950219f287ae876fbfdcc931b103dfe9

          SHA1

          65715d90dc12e821e7bf435280bcc0456558b2e9

          SHA256

          ddb824c8dba664ced8d1e085ad454d87cc0598df25cbf01d58c756ecadf921cc

          SHA512

          32c16ac8eea0e56911f22bcfaf136def39fbf9724dc39d803702a47493a2273ed09f2cce029e3f1fc12d79309c208e81f8c93507af90e5f26cd1ce7d6bf76b29

        • \Users\Admin\AppData\Local\Temp\rtad.exe

          Filesize

          62KB

          MD5

          950219f287ae876fbfdcc931b103dfe9

          SHA1

          65715d90dc12e821e7bf435280bcc0456558b2e9

          SHA256

          ddb824c8dba664ced8d1e085ad454d87cc0598df25cbf01d58c756ecadf921cc

          SHA512

          32c16ac8eea0e56911f22bcfaf136def39fbf9724dc39d803702a47493a2273ed09f2cce029e3f1fc12d79309c208e81f8c93507af90e5f26cd1ce7d6bf76b29

        • \Users\Admin\AppData\Local\Temp\rtad.exe

          Filesize

          62KB

          MD5

          950219f287ae876fbfdcc931b103dfe9

          SHA1

          65715d90dc12e821e7bf435280bcc0456558b2e9

          SHA256

          ddb824c8dba664ced8d1e085ad454d87cc0598df25cbf01d58c756ecadf921cc

          SHA512

          32c16ac8eea0e56911f22bcfaf136def39fbf9724dc39d803702a47493a2273ed09f2cce029e3f1fc12d79309c208e81f8c93507af90e5f26cd1ce7d6bf76b29

        • \Windows\SysWOW64\KcmlvE.pic

          Filesize

          55.1MB

          MD5

          346a77ad8fdda1baa7e0d6fe51e94ad8

          SHA1

          cbc5b036c3a7c091c307dbc7324827b8b69c4454

          SHA256

          46e9bc4b448ebc14c8c4bb226ef088850497822f9c6dd5b1486d33c82379cad5

          SHA512

          c0b4104cda2416989ee99cc0732de5a1f53d3a6e5ad257e53d217f31f799d518bc66b1603b8ad9b9c8bd7334155dd8f4657ae453780a668dcfe274874389db4b

        • \Windows\SysWOW64\KcmlvE.pic

          Filesize

          55.1MB

          MD5

          346a77ad8fdda1baa7e0d6fe51e94ad8

          SHA1

          cbc5b036c3a7c091c307dbc7324827b8b69c4454

          SHA256

          46e9bc4b448ebc14c8c4bb226ef088850497822f9c6dd5b1486d33c82379cad5

          SHA512

          c0b4104cda2416989ee99cc0732de5a1f53d3a6e5ad257e53d217f31f799d518bc66b1603b8ad9b9c8bd7334155dd8f4657ae453780a668dcfe274874389db4b

        • \Windows\SysWOW64\KcmlvE.pic

          Filesize

          55.1MB

          MD5

          346a77ad8fdda1baa7e0d6fe51e94ad8

          SHA1

          cbc5b036c3a7c091c307dbc7324827b8b69c4454

          SHA256

          46e9bc4b448ebc14c8c4bb226ef088850497822f9c6dd5b1486d33c82379cad5

          SHA512

          c0b4104cda2416989ee99cc0732de5a1f53d3a6e5ad257e53d217f31f799d518bc66b1603b8ad9b9c8bd7334155dd8f4657ae453780a668dcfe274874389db4b

        • \Windows\SysWOW64\KcmlvE.pic

          Filesize

          55.1MB

          MD5

          346a77ad8fdda1baa7e0d6fe51e94ad8

          SHA1

          cbc5b036c3a7c091c307dbc7324827b8b69c4454

          SHA256

          46e9bc4b448ebc14c8c4bb226ef088850497822f9c6dd5b1486d33c82379cad5

          SHA512

          c0b4104cda2416989ee99cc0732de5a1f53d3a6e5ad257e53d217f31f799d518bc66b1603b8ad9b9c8bd7334155dd8f4657ae453780a668dcfe274874389db4b

        • memory/1292-54-0x00000000762E1000-0x00000000762E3000-memory.dmp

          Filesize

          8KB