Analysis

  • max time kernel
    261s
  • max time network
    267s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2023 06:44

General

  • Target

    test.exe

  • Size

    36KB

  • MD5

    df8410184a39df8fe0bb38682632a28e

  • SHA1

    566daf16f0ae29f27458e627232549f2d3b8e11d

  • SHA256

    17eb7cf69711747cc912e9685f6c1e79846f030bd5fb4e854b6e3e9e715ab0de

  • SHA512

    75c6a1187ac692d00331bf1205cdca31e0e06a7e5d50deea48967c7540de99bc5843d230fca485c37ce6c10e552a6625238a6f1bd8b5d153fd3850f329633774

  • SSDEEP

    192:Y/l8yP7/73boE8jPJNJN1Rd/GO8LdubfXbLphoynfgH9teiDlFQ93M3pkR:8TLcPHJBIOvfZhWdteiD7QSc

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\test.exe
    "C:\Users\Admin\AppData\Local\Temp\test.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1944
  • C:\ProgramData\Thunder\LiveUpdate.exe
    C:\ProgramData\Thunder\LiveUpdate.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe"
      2⤵
        PID:4088
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 80
          3⤵
          • Program crash
          PID:812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4088 -ip 4088
      1⤵
        PID:4588
      • C:\ProgramData\Thunder\LiveUpdate.exe
        C:\ProgramData\Thunder\LiveUpdate.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3332
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe"
          2⤵
            PID:4484
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 80
              3⤵
              • Program crash
              PID:4144
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4484 -ip 4484
          1⤵
            PID:5012
          • C:\ProgramData\Thunder\LiveUpdate.exe
            C:\ProgramData\Thunder\LiveUpdate.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2400
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe"
              2⤵
              • Blocklisted process makes network request
              • Enumerates connected drives
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:2964

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Discovery

          Query Registry

          2
          T1012

          Peripheral Device Discovery

          1
          T1120

          System Information Discovery

          3
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\1.txt
            Filesize

            1.1MB

            MD5

            99cb9755677981518e59ba049e4b2e5a

            SHA1

            35a7899576f5bb2f0a99ea69e03acd4f9b63f831

            SHA256

            c6ae5b595850ec9d142f00843b63162fd4c5921038d0febe7b76a973f64493ba

            SHA512

            12ac1e3bd58ca92b6ab059c973607a93f22e21f098e0b6e20584dbf0a64085d1f278f6402144023b6c71b48bc2c8db2cf2f7052afc81b1570962ae81952b6b74

          • C:\ProgramData\SqlVersion.dll
            Filesize

            95KB

            MD5

            87bf7ce55dba3a9339302fadb215c0a5

            SHA1

            ce5905a284d0dc0984220fa0012107c7417fc491

            SHA256

            28d55c24d4aa08078bc8d3efcc656c7313fb62f883745e1bce8c3e25f5b59483

            SHA512

            29e2d7522dca4594d3753a235d34a72ec2c074747cc4e36a79112386fd417d3926c1bb40dbf04d7a9861139136c482cccff061d789081a102bbfa20efba273ed

          • C:\ProgramData\SqlVersion.dll
            Filesize

            95KB

            MD5

            87bf7ce55dba3a9339302fadb215c0a5

            SHA1

            ce5905a284d0dc0984220fa0012107c7417fc491

            SHA256

            28d55c24d4aa08078bc8d3efcc656c7313fb62f883745e1bce8c3e25f5b59483

            SHA512

            29e2d7522dca4594d3753a235d34a72ec2c074747cc4e36a79112386fd417d3926c1bb40dbf04d7a9861139136c482cccff061d789081a102bbfa20efba273ed

          • C:\ProgramData\Thunder\LiveUpdate.dat
            Filesize

            36KB

            MD5

            f033471932cc558c5f7a25261967a97b

            SHA1

            8186d2f9ae0ea74f2214da3ad0a932e609f25052

            SHA256

            9ab9d6ed62410c38f7045e5fedb39457db70cbb47cf4d1293fa1ef7a24fea41e

            SHA512

            406665d8f77c810e9a19676416249b7159208935b541c9f4f21bec91f74093fa9b4d6acfe511c07d9496064e9e951259b8c98e163ce7c69eff492e307b3423ac

          • C:\ProgramData\Thunder\LiveUpdate.exe
            Filesize

            470KB

            MD5

            96e4b47a136910d6f588b40d872e7f9d

            SHA1

            0d2eae5df6a4bbf79ec8cd3505d00c4bdabf331e

            SHA256

            f788ed739241f79688653d27aeefd18c9d8142a31fe0b5342535e392c040dd9b

            SHA512

            6776e37c4ed134003cdfe1c75e6133e805ee5a8db002710a14735c829fe66d24c3754c5033da6d2fd3e84b85df672b2f4862279bc04915ebfb798334c7f61cb4

          • C:\ProgramData\Thunder\LiveUpdate.exe
            Filesize

            470KB

            MD5

            96e4b47a136910d6f588b40d872e7f9d

            SHA1

            0d2eae5df6a4bbf79ec8cd3505d00c4bdabf331e

            SHA256

            f788ed739241f79688653d27aeefd18c9d8142a31fe0b5342535e392c040dd9b

            SHA512

            6776e37c4ed134003cdfe1c75e6133e805ee5a8db002710a14735c829fe66d24c3754c5033da6d2fd3e84b85df672b2f4862279bc04915ebfb798334c7f61cb4

          • C:\ProgramData\Thunder\LiveUpdate.exe
            Filesize

            470KB

            MD5

            96e4b47a136910d6f588b40d872e7f9d

            SHA1

            0d2eae5df6a4bbf79ec8cd3505d00c4bdabf331e

            SHA256

            f788ed739241f79688653d27aeefd18c9d8142a31fe0b5342535e392c040dd9b

            SHA512

            6776e37c4ed134003cdfe1c75e6133e805ee5a8db002710a14735c829fe66d24c3754c5033da6d2fd3e84b85df672b2f4862279bc04915ebfb798334c7f61cb4

          • C:\ProgramData\setting.ini
            Filesize

            14B

            MD5

            88cc3e3a35ac7a57a2d9b2632c7fc5f8

            SHA1

            67a04a547a9add726932e00447e1c6939f1639fb

            SHA256

            18739435f66131b1c596d73fada3d1219ea0a4f2d4ccee56573baef4161d5e43

            SHA512

            1c40fc3635b2117a1a970778a8dcc11ba97d77a34cbb43583a018e43c1648138a5f8aacaf4d1767deed0b0e39879476e0069a43506b93d19c4997a10b3060038

          • C:\Users\Admin\AppData\Local\Temp\_ir_tu2_temp_1\_TUProjDT.dat
            Filesize

            4B

            MD5

            bd74984124813a14a4b6794b4832c19d

            SHA1

            502ac30df476653c9c2189f97ade61919d132909

            SHA256

            c5d16bf49dfcd5b00c03ee20672285b953eb064de2927cce8628a42899ba3b91

            SHA512

            a9b757b43ac895e520087b28fc8fa7797b4dd29bd848b1159aed41cf065b10245e4ce055200e5cf3231f1558ed104735937de675aaacf7490dbc915d4d3d96eb

          • memory/2400-246-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB

          • memory/2400-220-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB

          • memory/2400-218-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB

          • memory/2964-227-0x0000000010000000-0x000000001017B000-memory.dmp
            Filesize

            1.5MB

          • memory/2964-244-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/2964-225-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/2964-222-0x0000000000400000-0x0000000000408000-memory.dmp
            Filesize

            32KB

          • memory/3332-176-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB

          • memory/3332-213-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB

          • memory/3332-182-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB

          • memory/3332-177-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB

          • memory/3332-174-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB

          • memory/4768-206-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB

          • memory/4768-168-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB

          • memory/4768-167-0x00000000025A0000-0x00000000025A9000-memory.dmp
            Filesize

            36KB

          • memory/4768-165-0x00000000025A0000-0x00000000025A9000-memory.dmp
            Filesize

            36KB

          • memory/4768-164-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB

          • memory/4768-162-0x0000000000400000-0x000000000053F000-memory.dmp
            Filesize

            1.2MB