Overview
overview
10Static
static
GO.bat
windows7-x64
1GO.bat
windows10-2004-x64
1GO1.bat
windows7-x64
1GO1.bat
windows10-2004-x64
1QQ565862362.bat
windows7-x64
7QQ565862362.bat
windows10-2004-x64
7QQ565862362.exe
windows7-x64
1QQ565862362.exe
windows10-2004-x64
1QtCore4.dll
windows7-x64
3QtCore4.dll
windows10-2004-x64
3QtGui4.dll
windows7-x64
3QtGui4.dll
windows10-2004-x64
3libeay32.dll
windows7-x64
1libeay32.dll
windows10-2004-x64
1msvcr71.dll
windows7-x64
3msvcr71.dll
windows10-2004-x64
3smss..exe
windows7-x64
1smss..exe
windows10-2004-x64
1ssleay32.dll
windows7-x64
1ssleay32.dll
windows10-2004-x64
1ϯ.bat
windows7-x64
1ϯ.bat
windows10-2004-x64
1143.exe
windows7-x64
10143.exe
windows10-2004-x64
101433.exe
windows7-x64
101433.exe
windows10-2004-x64
10Analysis
-
max time kernel
153s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
GO.bat
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
GO.bat
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
GO1.bat
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
GO1.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
QQ565862362.bat
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
QQ565862362.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
QQ565862362.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
QQ565862362.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
QtCore4.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
QtCore4.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
QtGui4.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
QtGui4.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
libeay32.dll
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
libeay32.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
msvcr71.dll
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
msvcr71.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
smss..exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
smss..exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
ssleay32.dll
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
ssleay32.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
ϯ.bat
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
ϯ.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral23
Sample
143.exe
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
143.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
1433.exe
Resource
win7-20220901-en
General
-
Target
1433.exe
-
Size
89KB
-
MD5
5aba57f11f1176d0a81dc28af9e77bdc
-
SHA1
efd087836b0bdd281b984bde113ab7f234cb38da
-
SHA256
4cc6f99c47bac7dd9f849aed8b0509511d5015efc80a284ba9a66cc60a36a559
-
SHA512
12ff3484fd7cfa6f290159a32e689f5130932806b4b2ccedae888eff30f420686ebefcdf5bb3e1013257830fc64f925cd26f776855ffb0b48465de64420ed59d
-
SSDEEP
1536:A9IywkUpmqyz2Wq9/lwiMbtzW56lq1eFd6+BHy7dHc4uNg/t4Bu6:A9IYiy6bjkDkMvHB8cj46
Malware Config
Signatures
-
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral26/memory/4348-133-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat behavioral26/memory/4348-134-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat behavioral26/memory/5036-138-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat behavioral26/memory/5036-139-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat behavioral26/files/0x0007000000022e2b-140.dat family_gh0strat behavioral26/files/0x0007000000022e2b-141.dat family_gh0strat behavioral26/memory/5036-142-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat behavioral26/files/0x0007000000022e2b-143.dat family_gh0strat behavioral26/memory/5036-144-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat behavioral26/files/0x0007000000022e2b-146.dat family_gh0strat behavioral26/files/0x0007000000022e2b-148.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 5036 gjheeflene -
Loads dropped DLL 4 IoCs
pid Process 4952 svchost.exe 1380 svchost.exe 1568 svchost.exe 2136 svchost.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\xghywybdji svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\xhqtxptkvw svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\xgxeuiivws svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\xhboagmril svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\xydbpmrmib svchost.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2944 4952 WerFault.exe 81 1124 1380 WerFault.exe 82 3340 1568 WerFault.exe 88 4148 2136 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5036 gjheeflene 5036 gjheeflene -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeRestorePrivilege 5036 gjheeflene Token: SeBackupPrivilege 5036 gjheeflene Token: SeBackupPrivilege 5036 gjheeflene Token: SeRestorePrivilege 5036 gjheeflene Token: SeRestorePrivilege 5036 gjheeflene Token: SeBackupPrivilege 5036 gjheeflene Token: SeBackupPrivilege 5036 gjheeflene Token: SeRestorePrivilege 5036 gjheeflene Token: SeBackupPrivilege 4952 svchost.exe Token: SeRestorePrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeSecurityPrivilege 4952 svchost.exe Token: SeSecurityPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeSecurityPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeSecurityPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeRestorePrivilege 4952 svchost.exe Token: SeBackupPrivilege 1380 svchost.exe Token: SeRestorePrivilege 1380 svchost.exe Token: SeBackupPrivilege 1380 svchost.exe Token: SeBackupPrivilege 1380 svchost.exe Token: SeSecurityPrivilege 1380 svchost.exe Token: SeSecurityPrivilege 1380 svchost.exe Token: SeBackupPrivilege 1380 svchost.exe Token: SeBackupPrivilege 1380 svchost.exe Token: SeSecurityPrivilege 1380 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeRestorePrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeSecurityPrivilege 1568 svchost.exe Token: SeSecurityPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeSecurityPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeSecurityPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeRestorePrivilege 1568 svchost.exe Token: SeBackupPrivilege 2136 svchost.exe Token: SeRestorePrivilege 2136 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4348 wrote to memory of 5036 4348 1433.exe 80 PID 4348 wrote to memory of 5036 4348 1433.exe 80 PID 4348 wrote to memory of 5036 4348 1433.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\1433.exe"C:\Users\Admin\AppData\Local\Temp\1433.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
\??\c:\users\admin\appdata\local\gjheeflene"C:\Users\Admin\AppData\Local\Temp\1433.exe" a -sc:\users\admin\appdata\local\temp\1433.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 9322⤵
- Program crash
PID:2944
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s ias1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 11122⤵
- Program crash
PID:1124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4952 -ip 49521⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1380 -ip 13801⤵PID:1564
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s ias1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 11162⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1568 -ip 15681⤵PID:3520
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s ias1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 9042⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2136 -ip 21361⤵PID:628
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.0MB
MD5f8bd2e4929bed38deee447d364457172
SHA109767a483b4397f4dd947f1c028d63fb70d09fb5
SHA256eeda5093f7ad46832761dda3cd2269d111d40652b7a4426cef0517bf1cd4652e
SHA512bf130e7e01244a7420c6fe03927592d4e3518b22256f50227c3a25ff382389178246e890d35fb7336b4c4e0c3da859f4ad36fb61763cf7802cd7e0045bb9f29c
-
Filesize
22.0MB
MD5f8bd2e4929bed38deee447d364457172
SHA109767a483b4397f4dd947f1c028d63fb70d09fb5
SHA256eeda5093f7ad46832761dda3cd2269d111d40652b7a4426cef0517bf1cd4652e
SHA512bf130e7e01244a7420c6fe03927592d4e3518b22256f50227c3a25ff382389178246e890d35fb7336b4c4e0c3da859f4ad36fb61763cf7802cd7e0045bb9f29c
-
Filesize
22.0MB
MD5f8bd2e4929bed38deee447d364457172
SHA109767a483b4397f4dd947f1c028d63fb70d09fb5
SHA256eeda5093f7ad46832761dda3cd2269d111d40652b7a4426cef0517bf1cd4652e
SHA512bf130e7e01244a7420c6fe03927592d4e3518b22256f50227c3a25ff382389178246e890d35fb7336b4c4e0c3da859f4ad36fb61763cf7802cd7e0045bb9f29c
-
Filesize
22.0MB
MD5f8bd2e4929bed38deee447d364457172
SHA109767a483b4397f4dd947f1c028d63fb70d09fb5
SHA256eeda5093f7ad46832761dda3cd2269d111d40652b7a4426cef0517bf1cd4652e
SHA512bf130e7e01244a7420c6fe03927592d4e3518b22256f50227c3a25ff382389178246e890d35fb7336b4c4e0c3da859f4ad36fb61763cf7802cd7e0045bb9f29c
-
Filesize
23.8MB
MD5b4f59130680880d30156dc24d8816e6a
SHA13495052051ff989d2b3ab1fb9e9751f3becad5f5
SHA25666029abe08feecd36619bcb8832f02bd16f1ca1dfd36a1bbc317e7d6dd9a8362
SHA512039e95dfb3b7c29964edd032b419a7aad80572989530c90ee4d883097a0dfa35621f38edae13f13afd15219c1fc4102d4cf6918c343a97f56165e6c3c9918b70
-
Filesize
204B
MD5b2243b095ed19527246b12ab8e1e243c
SHA13be7541686196d28bd082c02ef0367a170db5ef9
SHA2567788a046e02c82704f2704e44a029e4bfe1ed422941a8fda825a0c1b9feeb242
SHA512de8b58644e26455d844678df7cb856f32a18f491b6db28d60546b04f3c2794254e41ab2d97a98e481ed463a38af425f870a4c7edfc35914d0b31dd1c736da54e
-
Filesize
306B
MD5751f767685cd7254548284ddd13b4773
SHA19fecbf658459c08f422eb7a6999e35d2519a736f
SHA256db0c83b5c81caff89cfe488fdf3bb15deb88eaca20ad778fea75515811157681
SHA51251c99dd8dcac5f567fdcfde9c8d6ea0bbd90833f48fcb2e4ff2848b269869baedbf2ecd7db9a3b78699006619d7e343a0b14c0d81bc6c85dbc951d339af3f71f
-
Filesize
408B
MD5492fc1911f681393f1dd79b8235f1b82
SHA12eb2e1f9fe1ae21b6e960c0ca9b27b65f5d60370
SHA2569155fb711150112ab7e301c2d1e914d4255b9719ff8dcec0168b06be0b1e5451
SHA512c7964c92de4165ea686234ab7cee872549695c0aefc2829c9345d9787c153914a34a7a34826ed5f31f1035814cca14817635ca2e2a2873ec0be3db7c083565d9
-
Filesize
22.0MB
MD5f8bd2e4929bed38deee447d364457172
SHA109767a483b4397f4dd947f1c028d63fb70d09fb5
SHA256eeda5093f7ad46832761dda3cd2269d111d40652b7a4426cef0517bf1cd4652e
SHA512bf130e7e01244a7420c6fe03927592d4e3518b22256f50227c3a25ff382389178246e890d35fb7336b4c4e0c3da859f4ad36fb61763cf7802cd7e0045bb9f29c
-
Filesize
23.8MB
MD5b4f59130680880d30156dc24d8816e6a
SHA13495052051ff989d2b3ab1fb9e9751f3becad5f5
SHA25666029abe08feecd36619bcb8832f02bd16f1ca1dfd36a1bbc317e7d6dd9a8362
SHA512039e95dfb3b7c29964edd032b419a7aad80572989530c90ee4d883097a0dfa35621f38edae13f13afd15219c1fc4102d4cf6918c343a97f56165e6c3c9918b70