Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2023 08:05

General

  • Target

    tmp.exe

  • Size

    188KB

  • MD5

    1f3eff47818b6c31bf220154c0fdee12

  • SHA1

    26772f42ff36dc47e4aed1f7bbb4b0e331978410

  • SHA256

    bff74dc434e208598c2ba484341c6275eaeaa87992043f936e8915bde97b94a2

  • SHA512

    8d49c5a8e8885a359732bfef5805f57e981aa16a624756f0c37287ef2a5ecd7b9932633c217e9f3bdb1d317317a6118cfced97afe268a7f72272f08726c5ac12

  • SSDEEP

    3072:IWTDNVSbckR+z7uHVuoHsvmhtfwrHY52Lr0l7STUyg5f0oDAAt02un3:nvSbckA2VuisvmPOzptg5BA5p3

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Modifies RDP port number used by Windows 1 TTPs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 24 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:984
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file c:\IMG_0050.MOV
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:640
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4f0 0x4b4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\IMG_0050.MOV

    Filesize

    2.4MB

    MD5

    65b738f038962f076c94dee1f8b7db92

    SHA1

    41196bd05f89582c812e551dcde3ba6221e99c63

    SHA256

    628790c3dcd300d5934193a09323986a585bf60f8b8f9561812ce1977c6ce12c

    SHA512

    3bb978b6030c5d2c1d8303696cfbdb0c70230082876c804cd996a75faabb4cb8c58eeb7ab186df9bae8f396d5f59d45a4b33614c6b74f62827df082e9d5df5d3

  • memory/640-151-0x00007FF68E6C0000-0x00007FF68E7B8000-memory.dmp

    Filesize

    992KB

  • memory/640-152-0x00007FFD043A0000-0x00007FFD043D4000-memory.dmp

    Filesize

    208KB

  • memory/640-153-0x00007FFCFB550000-0x00007FFCFB804000-memory.dmp

    Filesize

    2.7MB

  • memory/640-155-0x00007FFD04320000-0x00007FFD04337000-memory.dmp

    Filesize

    92KB

  • memory/640-157-0x00007FFCFC1C0000-0x00007FFCFC1D7000-memory.dmp

    Filesize

    92KB

  • memory/640-159-0x00007FFCFC130000-0x00007FFCFC14D000-memory.dmp

    Filesize

    116KB

  • memory/640-160-0x00007FFCFC110000-0x00007FFCFC121000-memory.dmp

    Filesize

    68KB

  • memory/640-158-0x00007FFCFC150000-0x00007FFCFC161000-memory.dmp

    Filesize

    68KB

  • memory/640-156-0x00007FFD04300000-0x00007FFD04311000-memory.dmp

    Filesize

    68KB

  • memory/640-154-0x00007FFD0C6A0000-0x00007FFD0C6B8000-memory.dmp

    Filesize

    96KB

  • memory/640-161-0x00007FFCFB350000-0x00007FFCFB550000-memory.dmp

    Filesize

    2.0MB

  • memory/640-162-0x00007FFCFA2A0000-0x00007FFCFB34B000-memory.dmp

    Filesize

    16.7MB

  • memory/640-163-0x00007FFCFC0D0000-0x00007FFCFC10F000-memory.dmp

    Filesize

    252KB

  • memory/640-164-0x00007FFCFBF00000-0x00007FFCFBF21000-memory.dmp

    Filesize

    132KB

  • memory/640-165-0x00007FFCFC0B0000-0x00007FFCFC0C8000-memory.dmp

    Filesize

    96KB

  • memory/640-170-0x00007FFCFA260000-0x00007FFCFA271000-memory.dmp

    Filesize

    68KB

  • memory/640-175-0x00007FFCFA110000-0x00007FFCFA121000-memory.dmp

    Filesize

    68KB

  • memory/640-171-0x00007FFCFA240000-0x00007FFCFA258000-memory.dmp

    Filesize

    96KB

  • memory/640-174-0x00007FFCFA130000-0x00007FFCFA19F000-memory.dmp

    Filesize

    444KB

  • memory/640-176-0x00007FFCFA0B0000-0x00007FFCFA106000-memory.dmp

    Filesize

    344KB

  • memory/640-177-0x00007FFCF9F30000-0x00007FFCFA0A8000-memory.dmp

    Filesize

    1.5MB

  • memory/640-178-0x00007FFCF9F10000-0x00007FFCF9F27000-memory.dmp

    Filesize

    92KB

  • memory/640-172-0x00007FFCFA210000-0x00007FFCFA240000-memory.dmp

    Filesize

    192KB

  • memory/640-182-0x00007FFCF9CE0000-0x00007FFCF9D2C000-memory.dmp

    Filesize

    304KB

  • memory/640-183-0x00007FFCF9B70000-0x00007FFCF9CDB000-memory.dmp

    Filesize

    1.4MB

  • memory/640-180-0x00007FFCF9D80000-0x00007FFCF9D92000-memory.dmp

    Filesize

    72KB

  • memory/640-185-0x00007FFCF98C0000-0x00007FFCF9B0B000-memory.dmp

    Filesize

    2.3MB

  • memory/640-184-0x00007FFCF9B10000-0x00007FFCF9B67000-memory.dmp

    Filesize

    348KB

  • memory/640-181-0x00007FFCF9D30000-0x00007FFCF9D72000-memory.dmp

    Filesize

    264KB

  • memory/640-179-0x00007FFCF9DA0000-0x00007FFCF9F10000-memory.dmp

    Filesize

    1.4MB

  • memory/640-173-0x00007FFCFA1A0000-0x00007FFCFA207000-memory.dmp

    Filesize

    412KB

  • memory/640-169-0x00007FFCFA280000-0x00007FFCFA29B000-memory.dmp

    Filesize

    108KB

  • memory/640-168-0x00007FFCFBE00000-0x00007FFCFBE11000-memory.dmp

    Filesize

    68KB

  • memory/640-167-0x00007FFCFBE20000-0x00007FFCFBE31000-memory.dmp

    Filesize

    68KB

  • memory/640-166-0x00007FFCFBEE0000-0x00007FFCFBEF1000-memory.dmp

    Filesize

    68KB

  • memory/640-187-0x00007FFD14EF0000-0x00007FFD14F00000-memory.dmp

    Filesize

    64KB

  • memory/640-186-0x00007FFCF8110000-0x00007FFCF98C0000-memory.dmp

    Filesize

    23.7MB

  • memory/640-188-0x00007FFCF80E0000-0x00007FFCF810F000-memory.dmp

    Filesize

    188KB

  • memory/640-189-0x00007FFCF80C0000-0x00007FFCF80D1000-memory.dmp

    Filesize

    68KB

  • memory/640-192-0x00007FFCF7F50000-0x00007FFCF7FC5000-memory.dmp

    Filesize

    468KB

  • memory/640-190-0x00007FFCF80A0000-0x00007FFCF80B6000-memory.dmp

    Filesize

    88KB

  • memory/640-198-0x00007FFCF7DC0000-0x00007FFCF7DD5000-memory.dmp

    Filesize

    84KB

  • memory/640-196-0x00007FFCF7E30000-0x00007FFCF7E44000-memory.dmp

    Filesize

    80KB

  • memory/640-199-0x00007FFCF7BA0000-0x00007FFCF7DBD000-memory.dmp

    Filesize

    2.1MB

  • memory/640-195-0x00007FFCF7E50000-0x00007FFCF7E63000-memory.dmp

    Filesize

    76KB

  • memory/640-200-0x00007FFCF6E50000-0x00007FFCF6E65000-memory.dmp

    Filesize

    84KB

  • memory/640-202-0x00007FFCF6E00000-0x00007FFCF6E13000-memory.dmp

    Filesize

    76KB

  • memory/640-203-0x00007FFCF6D00000-0x00007FFCF6DF4000-memory.dmp

    Filesize

    976KB

  • memory/640-201-0x00007FFCF6E20000-0x00007FFCF6E43000-memory.dmp

    Filesize

    140KB

  • memory/640-206-0x00007FFCF6C90000-0x00007FFCF6CBA000-memory.dmp

    Filesize

    168KB

  • memory/640-207-0x00007FFCF6B10000-0x00007FFCF6C8A000-memory.dmp

    Filesize

    1.5MB

  • memory/640-208-0x00007FFCF6AF0000-0x00007FFCF6B03000-memory.dmp

    Filesize

    76KB

  • memory/640-209-0x00007FFCF6AD0000-0x00007FFCF6AEB000-memory.dmp

    Filesize

    108KB

  • memory/640-210-0x00007FFCF6AB0000-0x00007FFCF6AC2000-memory.dmp

    Filesize

    72KB

  • memory/640-205-0x00007FFCF6CC0000-0x00007FFCF6CD2000-memory.dmp

    Filesize

    72KB

  • memory/640-204-0x00007FFCF6CE0000-0x00007FFCF6CF1000-memory.dmp

    Filesize

    68KB

  • memory/640-197-0x00007FFCF7DE0000-0x00007FFCF7E30000-memory.dmp

    Filesize

    320KB

  • memory/640-194-0x00007FFCF7E70000-0x00007FFCF7EDD000-memory.dmp

    Filesize

    436KB

  • memory/640-193-0x00007FFCF7EE0000-0x00007FFCF7F42000-memory.dmp

    Filesize

    392KB

  • memory/640-191-0x00007FFCF7FD0000-0x00007FFCF8095000-memory.dmp

    Filesize

    788KB

  • memory/984-133-0x0000000006D10000-0x0000000006D5E000-memory.dmp

    Filesize

    312KB

  • memory/984-134-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB