Analysis

  • max time kernel
    192s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 01:17

General

  • Target

    8adcede30bb9ec86a76b189dc1b946189fb2070ec5ee7c520852a826fbf88a17.exe

  • Size

    95KB

  • MD5

    76ae544df272650310248892a72800fb

  • SHA1

    c259821477acf1cfc9b473bde2c62cd3d859e14a

  • SHA256

    8adcede30bb9ec86a76b189dc1b946189fb2070ec5ee7c520852a826fbf88a17

  • SHA512

    673deee1876aa8adf87a4fc0b30e79a10645e8983a9aecdad5e3f43cd26ad35cd510653bc67acf7560c2f50fb36c3f5f82c5ee593e3497e261e9b2aed7ccdbb5

  • SSDEEP

    1536:cNTrnFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prlBoCYvktI0:cNPRS4jHS8q/3nTzePCwNUh4E9leCYt0

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8adcede30bb9ec86a76b189dc1b946189fb2070ec5ee7c520852a826fbf88a17.exe
    "C:\Users\Admin\AppData\Local\Temp\8adcede30bb9ec86a76b189dc1b946189fb2070ec5ee7c520852a826fbf88a17.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4168
    • \??\c:\users\admin\appdata\local\mcwdyxommu
      "C:\Users\Admin\AppData\Local\Temp\8adcede30bb9ec86a76b189dc1b946189fb2070ec5ee7c520852a826fbf88a17.exe" a -sc:\users\admin\appdata\local\temp\8adcede30bb9ec86a76b189dc1b946189fb2070ec5ee7c520852a826fbf88a17.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4456
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4424
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s ias
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2360
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s irmon
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:704
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 704 -s 736
      2⤵
      • Program crash
      PID:4112
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 704 -ip 704
    1⤵
      PID:4616
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs -s irmon
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4588

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Storm\update\%SESSIONNAME%\xwbop.cc3

            Filesize

            20.1MB

            MD5

            5ffa28e55c3e493e6a4b42561d513130

            SHA1

            b1aa70d99616be3c9359d8a41d6f8f114119759e

            SHA256

            63c866f1b468f26188043ec314f0b90f1799eb262f5aac621c30e28573ad19a4

            SHA512

            351c1e0243dd2c943b1ffc0a746e48aeb9d0e45b684edd5b1e3bb3cb59f66521a728a2e2bb4df57774e892bf00b54945b3d661c12f549a04ab9e9a8f3a17dc3c

          • C:\ProgramData\Storm\update\%SESSIONNAME%\xwbop.cc3

            Filesize

            20.1MB

            MD5

            5ffa28e55c3e493e6a4b42561d513130

            SHA1

            b1aa70d99616be3c9359d8a41d6f8f114119759e

            SHA256

            63c866f1b468f26188043ec314f0b90f1799eb262f5aac621c30e28573ad19a4

            SHA512

            351c1e0243dd2c943b1ffc0a746e48aeb9d0e45b684edd5b1e3bb3cb59f66521a728a2e2bb4df57774e892bf00b54945b3d661c12f549a04ab9e9a8f3a17dc3c

          • C:\ProgramData\Storm\update\%SESSIONNAME%\xwbop.cc3

            Filesize

            20.1MB

            MD5

            5ffa28e55c3e493e6a4b42561d513130

            SHA1

            b1aa70d99616be3c9359d8a41d6f8f114119759e

            SHA256

            63c866f1b468f26188043ec314f0b90f1799eb262f5aac621c30e28573ad19a4

            SHA512

            351c1e0243dd2c943b1ffc0a746e48aeb9d0e45b684edd5b1e3bb3cb59f66521a728a2e2bb4df57774e892bf00b54945b3d661c12f549a04ab9e9a8f3a17dc3c

          • C:\ProgramData\Storm\update\%SESSIONNAME%\xwbop.cc3

            Filesize

            20.1MB

            MD5

            5ffa28e55c3e493e6a4b42561d513130

            SHA1

            b1aa70d99616be3c9359d8a41d6f8f114119759e

            SHA256

            63c866f1b468f26188043ec314f0b90f1799eb262f5aac621c30e28573ad19a4

            SHA512

            351c1e0243dd2c943b1ffc0a746e48aeb9d0e45b684edd5b1e3bb3cb59f66521a728a2e2bb4df57774e892bf00b54945b3d661c12f549a04ab9e9a8f3a17dc3c

          • C:\Users\Admin\AppData\Local\mcwdyxommu

            Filesize

            22.8MB

            MD5

            a8a5966d6b1f43c342d42409b0d32717

            SHA1

            a76c99943fea1e0a594f2f2f4d690f650018d9c5

            SHA256

            fda3d1e4eaf420f4f2a6d0e60ad83505124f15156aeeff7ce30481742d3f30fb

            SHA512

            66bebd081ff9128fa422d987cd74dfe9ee0a8b8b9f0a428303b9b3009db8b58366dc9a1d43035bce2b88bc09af55f852240694c21e4a8265fff507dd4d0344b1

          • \??\c:\programdata\application data\storm\update\%sessionname%\xwbop.cc3

            Filesize

            20.1MB

            MD5

            5ffa28e55c3e493e6a4b42561d513130

            SHA1

            b1aa70d99616be3c9359d8a41d6f8f114119759e

            SHA256

            63c866f1b468f26188043ec314f0b90f1799eb262f5aac621c30e28573ad19a4

            SHA512

            351c1e0243dd2c943b1ffc0a746e48aeb9d0e45b684edd5b1e3bb3cb59f66521a728a2e2bb4df57774e892bf00b54945b3d661c12f549a04ab9e9a8f3a17dc3c

          • \??\c:\users\admin\appdata\local\mcwdyxommu

            Filesize

            22.8MB

            MD5

            a8a5966d6b1f43c342d42409b0d32717

            SHA1

            a76c99943fea1e0a594f2f2f4d690f650018d9c5

            SHA256

            fda3d1e4eaf420f4f2a6d0e60ad83505124f15156aeeff7ce30481742d3f30fb

            SHA512

            66bebd081ff9128fa422d987cd74dfe9ee0a8b8b9f0a428303b9b3009db8b58366dc9a1d43035bce2b88bc09af55f852240694c21e4a8265fff507dd4d0344b1

          • memory/4168-136-0x0000000000400000-0x000000000044C621-memory.dmp

            Filesize

            305KB

          • memory/4168-132-0x0000000000400000-0x000000000044C621-memory.dmp

            Filesize

            305KB

          • memory/4456-138-0x0000000000400000-0x000000000044C621-memory.dmp

            Filesize

            305KB

          • memory/4456-137-0x0000000000400000-0x000000000044C621-memory.dmp

            Filesize

            305KB

          • memory/4456-143-0x0000000000400000-0x000000000044C621-memory.dmp

            Filesize

            305KB