Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 20:57

General

  • Target

    5455595d598c012ef4f1c780380e9da5be6aac3391fc160e601b2313b3a3618e.dll

  • Size

    101KB

  • MD5

    ce984afa468ecf45378f560032f2fe30

  • SHA1

    8ac533d69eee761236fe562af4ddead1f8cbaed1

  • SHA256

    5455595d598c012ef4f1c780380e9da5be6aac3391fc160e601b2313b3a3618e

  • SHA512

    526cf0ebdc96afffe9b3b30a8adc6b013c8bc011aa2d9ee5f93b25be4a2bd5da2af273849815f62f4153bf792f76730036d22b31da3be70a8317a319b3e667d7

  • SSDEEP

    3072:CwZSQpKa3VGVnpUlCz764/9xpEEBqbZuwa5iG:JJVGpxx9b3wZuwa4G

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5455595d598c012ef4f1c780380e9da5be6aac3391fc160e601b2313b3a3618e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5455595d598c012ef4f1c780380e9da5be6aac3391fc160e601b2313b3a3618e.dll,#1
      2⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1448
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k imgsvc
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1980

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\123456.jpg

    Filesize

    197KB

    MD5

    eda1a98b5f923dcddb0cef2cd68e727b

    SHA1

    4dd844389c6f7ed3c8439fa5c0bed0dc55bc8513

    SHA256

    49f334dca9bd56e41148c6d0e241f1e7e14f5c37b1ff21fd66e367781c206728

    SHA512

    54d3253e0dcdc212348c8964c75eeb8483ad6e9a8bd406be6c3cee6a4392ac82b90f196b144f44d43e27d70d1c816886c3b219316a985ad2e3502ae90992462e

  • memory/1448-55-0x00000000764D1000-0x00000000764D3000-memory.dmp

    Filesize

    8KB