Analysis

  • max time kernel
    166s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 22:37

General

  • Target

    a57f22af3a7ccd6767407a6ea7df326fbcad806f77761c63cb90994abc25b974.exe

  • Size

    272KB

  • MD5

    9c86a17f20093b7524829d2ddc75ecb4

  • SHA1

    aee458162a2f0850cdb535fd220507fee8ea9b0a

  • SHA256

    a57f22af3a7ccd6767407a6ea7df326fbcad806f77761c63cb90994abc25b974

  • SHA512

    8b5a9969f472af81f5838940efe9a9ce2a4ce99d5f8f9e968364c7680f129234a7c868dcf7ac63b3c3131f3fcce69023fb41066703843a4c1237a5b39021e660

  • SSDEEP

    6144:qyqgeXfYpBT3Ye77MF79n0KXs0YKMsHleE8wUV6Ed9E:qyqgeXfYTYe7InbDHCwab9

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 6 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a57f22af3a7ccd6767407a6ea7df326fbcad806f77761c63cb90994abc25b974.exe
    "C:\Users\Admin\AppData\Local\Temp\a57f22af3a7ccd6767407a6ea7df326fbcad806f77761c63cb90994abc25b974.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Program Files\Common Files\ctfn0m.ini
      "C:\Program Files\Common Files\ctfn0m.ini" "C:\Program Files\2658\26589999ctfn0n.2658lm" ServiceMain
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:856
    • C:\Documents and Settings\ctfn0m.exe
      "C:\Documents and Settings\ctfn0m.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\DOCUME~1\ctfn0m.exe
        3⤵
          PID:1988
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Program Files\Common Files\zidong.bat""
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Windows\SysWOW64\sc.exe
          sc config RasAuto start= auto
          3⤵
          • Launches sc.exe
          PID:676
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\Users\Admin\AppData\Local\Temp\A57F22~1.EXE
        2⤵
        • Deletes itself
        PID:1496

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Documents and Settings\ctfn0m.exe

      Filesize

      24.0MB

      MD5

      4301eb9e34773752b50934c1a8f2d435

      SHA1

      1231cc4109dc90fe4fa5aefccdbe73487bcf14a4

      SHA256

      900ccd6bd6a5d239514d1589564b2779e4da1467269b23a295ae3839ab29caab

      SHA512

      0440702bbbe5063e76e5c6c7249e9b43a79502cf3bb3e1610ca319c02628e32897f3bb98fcaa9377ba89cfea9779f233edc72697566f9e7f5e852913f9bceaff

    • C:\Program Files\2658\26589999ctfn0n.2658lm

      Filesize

      24.1MB

      MD5

      11bad3a0ce2055c5edf151a781da12cb

      SHA1

      94ca003904e8a30316920f089fd8fab3055d8b58

      SHA256

      0f670243244a34afad8a550bac7a748df1e004a2850bb0f27b16421691f4d568

      SHA512

      d5896a2f1a0fe79f79a3a022a90571e5319ffe576eaa782b60c1a5ecff0d4e09e2fa05ee86595c95947ea8d9f19b16b50b7206f5166363d2fe83d9d2bdd3b842

    • C:\Program Files\Common Files\ctfn0m.ini

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Program Files\Common Files\ctfn0m.ini

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Program Files\Common Files\zidong.bat

      Filesize

      44B

      MD5

      ea72733acebe9b418fb30d68b5a8c3df

      SHA1

      4bb0c9592895e902c95a190e9987ba82087060c0

      SHA256

      e4f714f6333f7f7e3f427072329471a22760d65c92311f3bd4c1d3cf6503a6ee

      SHA512

      4be94a98d79b54836765d724be21b91ff3a448fe8c921e30f3c929e87f6d0cce7be74005b7f5b2958f1404de601bbad658929a8aa7efbdfa95c6dd93cc15bff6

    • C:\Users\ctfn0m.exe

      Filesize

      24.0MB

      MD5

      4301eb9e34773752b50934c1a8f2d435

      SHA1

      1231cc4109dc90fe4fa5aefccdbe73487bcf14a4

      SHA256

      900ccd6bd6a5d239514d1589564b2779e4da1467269b23a295ae3839ab29caab

      SHA512

      0440702bbbe5063e76e5c6c7249e9b43a79502cf3bb3e1610ca319c02628e32897f3bb98fcaa9377ba89cfea9779f233edc72697566f9e7f5e852913f9bceaff

    • \Program Files\2658\26589999ctfn0n.2658lm

      Filesize

      24.1MB

      MD5

      11bad3a0ce2055c5edf151a781da12cb

      SHA1

      94ca003904e8a30316920f089fd8fab3055d8b58

      SHA256

      0f670243244a34afad8a550bac7a748df1e004a2850bb0f27b16421691f4d568

      SHA512

      d5896a2f1a0fe79f79a3a022a90571e5319ffe576eaa782b60c1a5ecff0d4e09e2fa05ee86595c95947ea8d9f19b16b50b7206f5166363d2fe83d9d2bdd3b842

    • \Program Files\Common Files\ctfn0m.ini

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • \Users\ctfn0m.exe

      Filesize

      24.0MB

      MD5

      4301eb9e34773752b50934c1a8f2d435

      SHA1

      1231cc4109dc90fe4fa5aefccdbe73487bcf14a4

      SHA256

      900ccd6bd6a5d239514d1589564b2779e4da1467269b23a295ae3839ab29caab

      SHA512

      0440702bbbe5063e76e5c6c7249e9b43a79502cf3bb3e1610ca319c02628e32897f3bb98fcaa9377ba89cfea9779f233edc72697566f9e7f5e852913f9bceaff

    • \Users\ctfn0m.exe

      Filesize

      24.0MB

      MD5

      4301eb9e34773752b50934c1a8f2d435

      SHA1

      1231cc4109dc90fe4fa5aefccdbe73487bcf14a4

      SHA256

      900ccd6bd6a5d239514d1589564b2779e4da1467269b23a295ae3839ab29caab

      SHA512

      0440702bbbe5063e76e5c6c7249e9b43a79502cf3bb3e1610ca319c02628e32897f3bb98fcaa9377ba89cfea9779f233edc72697566f9e7f5e852913f9bceaff

    • \Users\ctfn0m.exe

      Filesize

      24.0MB

      MD5

      4301eb9e34773752b50934c1a8f2d435

      SHA1

      1231cc4109dc90fe4fa5aefccdbe73487bcf14a4

      SHA256

      900ccd6bd6a5d239514d1589564b2779e4da1467269b23a295ae3839ab29caab

      SHA512

      0440702bbbe5063e76e5c6c7249e9b43a79502cf3bb3e1610ca319c02628e32897f3bb98fcaa9377ba89cfea9779f233edc72697566f9e7f5e852913f9bceaff

    • \Users\ctfn0m.exe

      Filesize

      24.0MB

      MD5

      4301eb9e34773752b50934c1a8f2d435

      SHA1

      1231cc4109dc90fe4fa5aefccdbe73487bcf14a4

      SHA256

      900ccd6bd6a5d239514d1589564b2779e4da1467269b23a295ae3839ab29caab

      SHA512

      0440702bbbe5063e76e5c6c7249e9b43a79502cf3bb3e1610ca319c02628e32897f3bb98fcaa9377ba89cfea9779f233edc72697566f9e7f5e852913f9bceaff

    • memory/856-76-0x0000000020000000-0x0000000020027000-memory.dmp

      Filesize

      156KB

    • memory/944-56-0x0000000000280000-0x0000000000301000-memory.dmp

      Filesize

      516KB

    • memory/944-54-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

      Filesize

      8KB

    • memory/944-57-0x0000000000380000-0x00000000003BE000-memory.dmp

      Filesize

      248KB

    • memory/944-55-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/944-66-0x00000000003D0000-0x00000000003D8000-memory.dmp

      Filesize

      32KB

    • memory/944-87-0x0000000000380000-0x00000000003BE000-memory.dmp

      Filesize

      248KB

    • memory/944-82-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/944-64-0x0000000000400000-0x0000000000481000-memory.dmp

      Filesize

      516KB

    • memory/2032-78-0x0000000000020000-0x0000000000028000-memory.dmp

      Filesize

      32KB

    • memory/2032-77-0x0000000000020000-0x0000000000028000-memory.dmp

      Filesize

      32KB

    • memory/2032-84-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2032-75-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB