Analysis
-
max time kernel
60s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 22:39
Static task
static1
Behavioral task
behavioral1
Sample
9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe
Resource
win10v2004-20220901-en
General
-
Target
9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe
-
Size
392KB
-
MD5
e5bc9ca9ea589d5aabd8325e8476d253
-
SHA1
c2fa8a3dbfeb72df437fe70dfb2e2d07429ff415
-
SHA256
9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c
-
SHA512
dfc18b03177badb480e15eebc825e56b838a66161ecfe4988218f83dedb7cec47a2aea75c01aad29928e55d86d4d97acc28bd27b88db8f34a44df5ca89304a2d
-
SSDEEP
6144:GZbXGgeRu/HYMDUkR3GKvf8QLBBzAM+GuN8QpKP+fA:GZjGgeRu1DUIlLbzL+jk+fA
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/files/0x000b0000000122f1-67.dat family_gh0strat behavioral1/memory/1672-68-0x0000000000400000-0x0000000000479000-memory.dmp family_gh0strat behavioral1/files/0x000b0000000122f1-69.dat family_gh0strat behavioral1/files/0x000b0000000122f1-71.dat family_gh0strat behavioral1/files/0x000b0000000122f1-70.dat family_gh0strat behavioral1/files/0x000b0000000122f1-72.dat family_gh0strat behavioral1/memory/2036-73-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/2036-74-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/1672-90-0x0000000000400000-0x0000000000479000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2036 qiuqi0.exe 1912 qiuqi0.exe -
Deletes itself 1 IoCs
pid Process 1088 cmd.exe -
Loads dropped DLL 11 IoCs
pid Process 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 2036 qiuqi0.exe 2036 qiuqi0.exe 2036 qiuqi0.exe 2036 qiuqi0.exe 2036 qiuqi0.exe 2036 qiuqi0.exe 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 1912 qiuqi0.exe 1912 qiuqi0.exe 1912 qiuqi0.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 qiuqi0.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Common Files\qiuqi0.bat 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe File created C:\Program Files\Common Files\maoma0.dll 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe File created C:\Program Files\Common Files\qiuqi0.dll 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe File created C:\Program Files\Common Files\qiuqi0.exe 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe File opened for modification C:\Program Files\Common Files\qiuqi0.exe 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 qiuqi0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz qiuqi0.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID qiuqi0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC} qiuqi0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{603D3801-BD81-11d0-A3A5-00C04FD706EC}\InProcServer32 qiuqi0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2036 qiuqi0.exe 2036 qiuqi0.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2036 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 27 PID 1672 wrote to memory of 2036 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 27 PID 1672 wrote to memory of 2036 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 27 PID 1672 wrote to memory of 2036 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 27 PID 1672 wrote to memory of 2036 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 27 PID 1672 wrote to memory of 2036 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 27 PID 1672 wrote to memory of 2036 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 27 PID 1672 wrote to memory of 1912 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 28 PID 1672 wrote to memory of 1912 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 28 PID 1672 wrote to memory of 1912 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 28 PID 1672 wrote to memory of 1912 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 28 PID 1672 wrote to memory of 1912 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 28 PID 1672 wrote to memory of 1912 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 28 PID 1672 wrote to memory of 1912 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 28 PID 1912 wrote to memory of 1320 1912 qiuqi0.exe 29 PID 1912 wrote to memory of 1320 1912 qiuqi0.exe 29 PID 1912 wrote to memory of 1320 1912 qiuqi0.exe 29 PID 1912 wrote to memory of 1320 1912 qiuqi0.exe 29 PID 1912 wrote to memory of 1320 1912 qiuqi0.exe 29 PID 1912 wrote to memory of 1320 1912 qiuqi0.exe 29 PID 1912 wrote to memory of 1320 1912 qiuqi0.exe 29 PID 1672 wrote to memory of 1088 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 31 PID 1672 wrote to memory of 1088 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 31 PID 1672 wrote to memory of 1088 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 31 PID 1672 wrote to memory of 1088 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 31 PID 1672 wrote to memory of 1088 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 31 PID 1672 wrote to memory of 1088 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 31 PID 1672 wrote to memory of 1088 1672 9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe"C:\Users\Admin\AppData\Local\Temp\9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files\Common Files\qiuqi0.exe"C:\Program Files\Common Files\qiuqi0.exe" "C:\Program Files\Common Files\maoma0.dll" ServiceMain2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Documents and Settings\qiuqi0.exe"C:\Documents and Settings\qiuqi0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\DOCUME~1\qiuqi0.exe3⤵PID:1320
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\9F5C7E~1.EXE2⤵
- Deletes itself
PID:1088
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.0MB
MD541876257df75dc8a0ab8c20f7aaf0892
SHA1fbdc3c4a344c1356cd4e20dc4c05a2e73fcade97
SHA256b9ec9ee9171575b50059af1d23760b69e11b6f4d2857b99599beb294af34a33c
SHA5123243a58c0d71fa9bfe715030b837429c0277e56705b40ebd9bbfe71a9404b58db0ff0deed49a073cc5807ddde12862713a55ff3a531d4b8d144922e4f760804b
-
Filesize
24.1MB
MD582482993fc9968236e8ec0004874cd64
SHA1ba77599d8258aa1db556bf65c61f0e1e95daefb1
SHA256ce631db8a9bbfae26bcd9345c52932abdf5a604111efed75d2b26f6726559588
SHA51268aded4bce501f6b2e96c363c3d92944c633d649654bcc68a2033a508a50036f96ee00606b61e8fd1e91b74bf0f4838dbab956377949bb4a81f57e2911774c6e
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
24.0MB
MD541876257df75dc8a0ab8c20f7aaf0892
SHA1fbdc3c4a344c1356cd4e20dc4c05a2e73fcade97
SHA256b9ec9ee9171575b50059af1d23760b69e11b6f4d2857b99599beb294af34a33c
SHA5123243a58c0d71fa9bfe715030b837429c0277e56705b40ebd9bbfe71a9404b58db0ff0deed49a073cc5807ddde12862713a55ff3a531d4b8d144922e4f760804b
-
Filesize
24.1MB
MD582482993fc9968236e8ec0004874cd64
SHA1ba77599d8258aa1db556bf65c61f0e1e95daefb1
SHA256ce631db8a9bbfae26bcd9345c52932abdf5a604111efed75d2b26f6726559588
SHA51268aded4bce501f6b2e96c363c3d92944c633d649654bcc68a2033a508a50036f96ee00606b61e8fd1e91b74bf0f4838dbab956377949bb4a81f57e2911774c6e
-
Filesize
24.1MB
MD582482993fc9968236e8ec0004874cd64
SHA1ba77599d8258aa1db556bf65c61f0e1e95daefb1
SHA256ce631db8a9bbfae26bcd9345c52932abdf5a604111efed75d2b26f6726559588
SHA51268aded4bce501f6b2e96c363c3d92944c633d649654bcc68a2033a508a50036f96ee00606b61e8fd1e91b74bf0f4838dbab956377949bb4a81f57e2911774c6e
-
Filesize
24.1MB
MD582482993fc9968236e8ec0004874cd64
SHA1ba77599d8258aa1db556bf65c61f0e1e95daefb1
SHA256ce631db8a9bbfae26bcd9345c52932abdf5a604111efed75d2b26f6726559588
SHA51268aded4bce501f6b2e96c363c3d92944c633d649654bcc68a2033a508a50036f96ee00606b61e8fd1e91b74bf0f4838dbab956377949bb4a81f57e2911774c6e
-
Filesize
24.1MB
MD582482993fc9968236e8ec0004874cd64
SHA1ba77599d8258aa1db556bf65c61f0e1e95daefb1
SHA256ce631db8a9bbfae26bcd9345c52932abdf5a604111efed75d2b26f6726559588
SHA51268aded4bce501f6b2e96c363c3d92944c633d649654bcc68a2033a508a50036f96ee00606b61e8fd1e91b74bf0f4838dbab956377949bb4a81f57e2911774c6e
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
24.0MB
MD541876257df75dc8a0ab8c20f7aaf0892
SHA1fbdc3c4a344c1356cd4e20dc4c05a2e73fcade97
SHA256b9ec9ee9171575b50059af1d23760b69e11b6f4d2857b99599beb294af34a33c
SHA5123243a58c0d71fa9bfe715030b837429c0277e56705b40ebd9bbfe71a9404b58db0ff0deed49a073cc5807ddde12862713a55ff3a531d4b8d144922e4f760804b
-
Filesize
24.0MB
MD541876257df75dc8a0ab8c20f7aaf0892
SHA1fbdc3c4a344c1356cd4e20dc4c05a2e73fcade97
SHA256b9ec9ee9171575b50059af1d23760b69e11b6f4d2857b99599beb294af34a33c
SHA5123243a58c0d71fa9bfe715030b837429c0277e56705b40ebd9bbfe71a9404b58db0ff0deed49a073cc5807ddde12862713a55ff3a531d4b8d144922e4f760804b
-
Filesize
24.0MB
MD541876257df75dc8a0ab8c20f7aaf0892
SHA1fbdc3c4a344c1356cd4e20dc4c05a2e73fcade97
SHA256b9ec9ee9171575b50059af1d23760b69e11b6f4d2857b99599beb294af34a33c
SHA5123243a58c0d71fa9bfe715030b837429c0277e56705b40ebd9bbfe71a9404b58db0ff0deed49a073cc5807ddde12862713a55ff3a531d4b8d144922e4f760804b
-
Filesize
24.0MB
MD541876257df75dc8a0ab8c20f7aaf0892
SHA1fbdc3c4a344c1356cd4e20dc4c05a2e73fcade97
SHA256b9ec9ee9171575b50059af1d23760b69e11b6f4d2857b99599beb294af34a33c
SHA5123243a58c0d71fa9bfe715030b837429c0277e56705b40ebd9bbfe71a9404b58db0ff0deed49a073cc5807ddde12862713a55ff3a531d4b8d144922e4f760804b