Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03-04-2023 08:55

General

  • Target

    (电-子-发-票).exe

  • Size

    36KB

  • MD5

    928c43415fa08992ecf34e90db8c2a5b

  • SHA1

    b2bd43ff4005bce6d39fad9d8bf2c2f25a89f37c

  • SHA256

    e9cc6d34b4e20a11e3af01182672a0ca71d111d1b89d73fc8584a5534d491d7e

  • SHA512

    d1c847fbf19e5d7661ff90b365decc25142de94304c812c016719948901586378909d28424bb388f904f01b072f7840758d6baa4e75a7f857799333acab7976d

  • SSDEEP

    384:4krtyExpPhFmSkkuJ0EKtU/lOgDTp4nuHD80sApEQDeT6lF:jVh93umEeUcgDTWujtP

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\(电-子-发-票).exe
    "C:\Users\Admin\AppData\Local\Temp\(电-子-发-票).exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1988
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {0150FB0F-4E11-46E3-BFC2-75E664E9214C} S-1-5-21-1563773381-2037468142-1146002597-1000:YBHADZIG\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\ProgramData\Thunder\LiveUpdate.exe
      C:\ProgramData\Thunder\LiveUpdate.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1708

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\SqlVersion.dll
    Filesize

    1.8MB

    MD5

    317f9ff06c076e87e5b1d11242396d5f

    SHA1

    29868086fe5adb4b32c0216d953c419b596246c7

    SHA256

    0e10625daf43a3f4c67f2840ced29d535d0307148819c8ec73a7e76241e9f644

    SHA512

    ba2b12fc365fa232e6c96e1c8ebceb77bf9347fba2ffb4e3cee7d7be829cbab3cec17668cbf401b4904e5b831df3c6550821da1921f214166862dcc83ab44f07

  • C:\ProgramData\Thunder\LiveUpdate.dat
    Filesize

    23KB

    MD5

    f149d3f3ef0361ebe4d346811f29b527

    SHA1

    3f985657f0b93a58e9405d32eab4ee3957af12d2

    SHA256

    0929342683de55e572e11428b0cb545f6582c705c59655c0872589ae16043235

    SHA512

    331645f91cecb66fd8c04a26edc58d6e03ad44710b5b35161cbba3831e09855e02292ffb802d3a2c0ce1a4ecd9f301a580ff1d695ae06c7eda7d90ae72ef602c

  • C:\ProgramData\Thunder\LiveUpdate.exe
    Filesize

    470KB

    MD5

    96e4b47a136910d6f588b40d872e7f9d

    SHA1

    0d2eae5df6a4bbf79ec8cd3505d00c4bdabf331e

    SHA256

    f788ed739241f79688653d27aeefd18c9d8142a31fe0b5342535e392c040dd9b

    SHA512

    6776e37c4ed134003cdfe1c75e6133e805ee5a8db002710a14735c829fe66d24c3754c5033da6d2fd3e84b85df672b2f4862279bc04915ebfb798334c7f61cb4

  • C:\ProgramData\Thunder\LiveUpdate.exe
    Filesize

    470KB

    MD5

    96e4b47a136910d6f588b40d872e7f9d

    SHA1

    0d2eae5df6a4bbf79ec8cd3505d00c4bdabf331e

    SHA256

    f788ed739241f79688653d27aeefd18c9d8142a31fe0b5342535e392c040dd9b

    SHA512

    6776e37c4ed134003cdfe1c75e6133e805ee5a8db002710a14735c829fe66d24c3754c5033da6d2fd3e84b85df672b2f4862279bc04915ebfb798334c7f61cb4

  • C:\ProgramData\Thunder\Media.xml
    Filesize

    1.1MB

    MD5

    fd481828932e558a22651c092d8bc407

    SHA1

    0db0d90b2384197d4136643c11cc42091f2a4943

    SHA256

    b607ba991b27cf9551ffbf51b3e1f2c6a6a63d9748ac9d5c89c4f1b95f76bfa1

    SHA512

    934b78d80f88b2fe27bc2371b891c171852ceb465980e25bc96220edbd32cfd9e7057d59e3152a506baa862face14b7e1bc5221ce524c2845755c6f5b0514e61

  • C:\ProgramData\setting.ini
    Filesize

    14B

    MD5

    88cc3e3a35ac7a57a2d9b2632c7fc5f8

    SHA1

    67a04a547a9add726932e00447e1c6939f1639fb

    SHA256

    18739435f66131b1c596d73fada3d1219ea0a4f2d4ccee56573baef4161d5e43

    SHA512

    1c40fc3635b2117a1a970778a8dcc11ba97d77a34cbb43583a018e43c1648138a5f8aacaf4d1767deed0b0e39879476e0069a43506b93d19c4997a10b3060038

  • \ProgramData\SqlVersion.dll
    Filesize

    1.8MB

    MD5

    317f9ff06c076e87e5b1d11242396d5f

    SHA1

    29868086fe5adb4b32c0216d953c419b596246c7

    SHA256

    0e10625daf43a3f4c67f2840ced29d535d0307148819c8ec73a7e76241e9f644

    SHA512

    ba2b12fc365fa232e6c96e1c8ebceb77bf9347fba2ffb4e3cee7d7be829cbab3cec17668cbf401b4904e5b831df3c6550821da1921f214166862dcc83ab44f07

  • memory/1708-87-0x0000000000400000-0x000000000053F000-memory.dmp
    Filesize

    1.2MB

  • memory/1708-123-0x0000000000400000-0x000000000053F000-memory.dmp
    Filesize

    1.2MB

  • memory/1708-84-0x0000000000400000-0x000000000053F000-memory.dmp
    Filesize

    1.2MB

  • memory/1708-128-0x0000000000400000-0x000000000053F000-memory.dmp
    Filesize

    1.2MB

  • memory/1708-85-0x0000000000400000-0x000000000053F000-memory.dmp
    Filesize

    1.2MB

  • memory/1708-91-0x0000000001F70000-0x0000000001F71000-memory.dmp
    Filesize

    4KB

  • memory/1708-93-0x0000000000400000-0x000000000053F000-memory.dmp
    Filesize

    1.2MB

  • memory/1708-124-0x0000000000400000-0x000000000053F000-memory.dmp
    Filesize

    1.2MB

  • memory/1708-94-0x0000000003340000-0x00000000034BB000-memory.dmp
    Filesize

    1.5MB

  • memory/1708-97-0x0000000003340000-0x00000000034BB000-memory.dmp
    Filesize

    1.5MB

  • memory/1708-100-0x0000000000400000-0x000000000053F000-memory.dmp
    Filesize

    1.2MB

  • memory/1708-121-0x0000000000400000-0x000000000053F000-memory.dmp
    Filesize

    1.2MB

  • memory/1708-122-0x0000000000400000-0x000000000053F000-memory.dmp
    Filesize

    1.2MB

  • memory/1988-79-0x0000000073DF0000-0x0000000073FB7000-memory.dmp
    Filesize

    1.8MB

  • memory/1988-77-0x0000000073DF0000-0x0000000073FB7000-memory.dmp
    Filesize

    1.8MB

  • memory/1988-81-0x0000000073DF0000-0x0000000073FB7000-memory.dmp
    Filesize

    1.8MB