Analysis

  • max time kernel
    152s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 08:15

General

  • Target

    b562084d28609c489257c3dac5ef1384396cae2a10664dac04991d9d2cc36c65.exe

  • Size

    192KB

  • MD5

    13356674c0b28f5de14e13f606d37530

  • SHA1

    10400bc09b12ca3b4a75bb9125320bd575cffb96

  • SHA256

    b562084d28609c489257c3dac5ef1384396cae2a10664dac04991d9d2cc36c65

  • SHA512

    3ce0cc561b6e6a52d9fedfa55c8314596ab17aa29bc24af96561ab9846f89a662db0cc023baf0101c1dc9b5b2aa71d9220067764f1b6ae16c5abe1398e00076b

  • SSDEEP

    3072:OQk3DH+bK+snWjvUJFMKkj8aPBHA40qcVWhUXYvpSVxoTVrbMzYiw/mEFVg:OQkTH+bpsnWjvEkrPadqc6UIvK6jt+

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 7 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b562084d28609c489257c3dac5ef1384396cae2a10664dac04991d9d2cc36c65.exe
    "C:\Users\Admin\AppData\Local\Temp\b562084d28609c489257c3dac5ef1384396cae2a10664dac04991d9d2cc36c65.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2964
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
    1⤵
    • Loads dropped DLL
    PID:3476
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 596
      2⤵
      • Program crash
      PID:2176
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3476 -ip 3476
    1⤵
      PID:3436
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs -s ias
      1⤵
      • Loads dropped DLL
      PID:1488
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 596
        2⤵
        • Program crash
        PID:2308
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1488 -ip 1488
      1⤵
        PID:1284
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe -k netsvcs -s irmon
        1⤵
        • Loads dropped DLL
        PID:2608
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 600
          2⤵
          • Program crash
          PID:3492
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2608 -ip 2608
        1⤵
          PID:1200
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\SysWOW64\svchost.exe -k netsvcs -s irmon
          1⤵
          • Loads dropped DLL
          PID:1984
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 592
            2⤵
            • Program crash
            PID:2012
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1984 -ip 1984
          1⤵
            PID:4560
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k netsvcs -s nla
            1⤵
            • Loads dropped DLL
            PID:3404
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 592
              2⤵
              • Program crash
              PID:1728
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3404 -ip 3404
            1⤵
              PID:4176
            • C:\Windows\SysWOW64\svchost.exe
              C:\Windows\SysWOW64\svchost.exe -k netsvcs -s nla
              1⤵
              • Loads dropped DLL
              PID:4280
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 596
                2⤵
                • Program crash
                PID:4616
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4280 -ip 4280
              1⤵
                PID:1040

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Windows\SysWOW64\jqiiv.cc3

                Filesize

                23.0MB

                MD5

                7b19387c3bd2b30d1c64e2a485664749

                SHA1

                411e45fdf928752056019f35f0cbbed59f544d9d

                SHA256

                53a6f2db4f8b5c07797d47621bdcd7b476c7ab4076243581f0832499075bcbce

                SHA512

                240c542aadc045be68ed8e01ba6cab44c6ff152c9cc96f3d313224527784f655559432ec9f69a127fcdcd6c89fa981a119a88beb51970f6e8186acf84d9487ee

              • C:\Windows\SysWOW64\jqiiv.cc3

                Filesize

                23.0MB

                MD5

                7b19387c3bd2b30d1c64e2a485664749

                SHA1

                411e45fdf928752056019f35f0cbbed59f544d9d

                SHA256

                53a6f2db4f8b5c07797d47621bdcd7b476c7ab4076243581f0832499075bcbce

                SHA512

                240c542aadc045be68ed8e01ba6cab44c6ff152c9cc96f3d313224527784f655559432ec9f69a127fcdcd6c89fa981a119a88beb51970f6e8186acf84d9487ee

              • C:\Windows\SysWOW64\jqiiv.cc3

                Filesize

                23.0MB

                MD5

                7b19387c3bd2b30d1c64e2a485664749

                SHA1

                411e45fdf928752056019f35f0cbbed59f544d9d

                SHA256

                53a6f2db4f8b5c07797d47621bdcd7b476c7ab4076243581f0832499075bcbce

                SHA512

                240c542aadc045be68ed8e01ba6cab44c6ff152c9cc96f3d313224527784f655559432ec9f69a127fcdcd6c89fa981a119a88beb51970f6e8186acf84d9487ee

              • C:\Windows\SysWOW64\jqiiv.cc3

                Filesize

                23.0MB

                MD5

                7b19387c3bd2b30d1c64e2a485664749

                SHA1

                411e45fdf928752056019f35f0cbbed59f544d9d

                SHA256

                53a6f2db4f8b5c07797d47621bdcd7b476c7ab4076243581f0832499075bcbce

                SHA512

                240c542aadc045be68ed8e01ba6cab44c6ff152c9cc96f3d313224527784f655559432ec9f69a127fcdcd6c89fa981a119a88beb51970f6e8186acf84d9487ee

              • C:\Windows\SysWOW64\jqiiv.cc3

                Filesize

                23.0MB

                MD5

                7b19387c3bd2b30d1c64e2a485664749

                SHA1

                411e45fdf928752056019f35f0cbbed59f544d9d

                SHA256

                53a6f2db4f8b5c07797d47621bdcd7b476c7ab4076243581f0832499075bcbce

                SHA512

                240c542aadc045be68ed8e01ba6cab44c6ff152c9cc96f3d313224527784f655559432ec9f69a127fcdcd6c89fa981a119a88beb51970f6e8186acf84d9487ee

              • C:\Windows\SysWOW64\jqiiv.cc3

                Filesize

                23.0MB

                MD5

                7b19387c3bd2b30d1c64e2a485664749

                SHA1

                411e45fdf928752056019f35f0cbbed59f544d9d

                SHA256

                53a6f2db4f8b5c07797d47621bdcd7b476c7ab4076243581f0832499075bcbce

                SHA512

                240c542aadc045be68ed8e01ba6cab44c6ff152c9cc96f3d313224527784f655559432ec9f69a127fcdcd6c89fa981a119a88beb51970f6e8186acf84d9487ee

              • \??\c:\windows\SysWOW64\jqiiv.cc3

                Filesize

                23.0MB

                MD5

                7b19387c3bd2b30d1c64e2a485664749

                SHA1

                411e45fdf928752056019f35f0cbbed59f544d9d

                SHA256

                53a6f2db4f8b5c07797d47621bdcd7b476c7ab4076243581f0832499075bcbce

                SHA512

                240c542aadc045be68ed8e01ba6cab44c6ff152c9cc96f3d313224527784f655559432ec9f69a127fcdcd6c89fa981a119a88beb51970f6e8186acf84d9487ee