Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2023, 04:02

General

  • Target

    tmp.exe

  • Size

    825KB

  • MD5

    c39c3dfd2fa7b3f2ec04ad691e4e1653

  • SHA1

    68289a19b9a8aa584091a7fd7584e5c5f2c503c2

  • SHA256

    f2b6c63adc675c2a07ba982e1fa07564981663ffe6400814ba2e491edcf21e97

  • SHA512

    3bdb72e8e39be03014063d972b48cdb7ea5d821ff4d4adab64592c9d580952c4574d55b37d347a4ea79e3e4693ebed63db31857211dc922ceaf01b8febc13042

  • SSDEEP

    12288:BMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9/UJqxj:BnsJ39LyjbJkQFMhmC+6GD9MJqZ

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Windows\ETA-AntiCheat.exe
        "C:\Windows\ETA-AntiCheat.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:992
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2292
        • C:\Windows\ETA-AntiCheat.exe
          "C:\Windows\ETA-AntiCheat.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3540
  • C:\Windows\ETA-AntiCheat.exe
    C:\Windows\ETA-AntiCheat.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Windows\ETA-AntiCheat.exe
      C:\Windows\ETA-AntiCheat.exe
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      PID:3416
    • C:\Windows\ETA-AntiCheat.exe
      C:\Windows\ETA-AntiCheat.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4408
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 568
      2⤵
      • Program crash
      PID:3720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3340 -ip 3340
    1⤵
      PID:1516

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\AppPatch\1.dll

            Filesize

            239KB

            MD5

            8c19d83ff359a1b77cb06939c2e5f0cb

            SHA1

            a01a199e6f6f3e84cef5c7e6251a2b1291217885

            SHA256

            7baee22c9834bef64f0c1b7f5988d9717855942d87c82f019606d07589bc51a9

            SHA512

            b241c7b0f6372483faf4630e82d7f609e8450bac17cedaeb8fc7db8157ec5363e153f5cab5188eee6d8b27b366656877d4421122c8e26a0a739b6c5308bde381

          • C:\ProgramData\Synaptics\Synaptics.exe

            Filesize

            825KB

            MD5

            c39c3dfd2fa7b3f2ec04ad691e4e1653

            SHA1

            68289a19b9a8aa584091a7fd7584e5c5f2c503c2

            SHA256

            f2b6c63adc675c2a07ba982e1fa07564981663ffe6400814ba2e491edcf21e97

            SHA512

            3bdb72e8e39be03014063d972b48cdb7ea5d821ff4d4adab64592c9d580952c4574d55b37d347a4ea79e3e4693ebed63db31857211dc922ceaf01b8febc13042

          • C:\ProgramData\Synaptics\Synaptics.exe

            Filesize

            825KB

            MD5

            c39c3dfd2fa7b3f2ec04ad691e4e1653

            SHA1

            68289a19b9a8aa584091a7fd7584e5c5f2c503c2

            SHA256

            f2b6c63adc675c2a07ba982e1fa07564981663ffe6400814ba2e491edcf21e97

            SHA512

            3bdb72e8e39be03014063d972b48cdb7ea5d821ff4d4adab64592c9d580952c4574d55b37d347a4ea79e3e4693ebed63db31857211dc922ceaf01b8febc13042

          • C:\ProgramData\Synaptics\Synaptics.exe

            Filesize

            825KB

            MD5

            c39c3dfd2fa7b3f2ec04ad691e4e1653

            SHA1

            68289a19b9a8aa584091a7fd7584e5c5f2c503c2

            SHA256

            f2b6c63adc675c2a07ba982e1fa07564981663ffe6400814ba2e491edcf21e97

            SHA512

            3bdb72e8e39be03014063d972b48cdb7ea5d821ff4d4adab64592c9d580952c4574d55b37d347a4ea79e3e4693ebed63db31857211dc922ceaf01b8febc13042

          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • C:\Windows\ETA-AntiCheat.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • C:\Windows\ETA-AntiCheat.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • C:\Windows\ETA-AntiCheat.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • C:\Windows\ETA-AntiCheat.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • C:\Windows\ETA-AntiCheat.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • C:\Windows\ETA-AntiCheat.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • C:\Windows\ETA-AntiCheat.exe

            Filesize

            72KB

            MD5

            acf57b0c0b7ec27e1953917259ce0e59

            SHA1

            6a342a9d4f86e8312602997c7fb9784f9c6f9de3

            SHA256

            ad5800b93ddc83cecc75e88358bcfc0602841814e205fd798733569c6756da39

            SHA512

            7b265b1c40d615b706b931ea86fdf28de32cc5312b362b837e56cf3f70a06810425865e2b2dff0df85fde493042e5cac910fd5118e2c8461e49d16d1a451f2da

          • memory/1764-312-0x0000000002130000-0x0000000002131000-memory.dmp

            Filesize

            4KB

          • memory/1764-447-0x0000000000400000-0x00000000004D4000-memory.dmp

            Filesize

            848KB

          • memory/1764-419-0x0000000002130000-0x0000000002131000-memory.dmp

            Filesize

            4KB

          • memory/1764-418-0x0000000000400000-0x00000000004D4000-memory.dmp

            Filesize

            848KB

          • memory/2028-165-0x00000000006C0000-0x00000000006C1000-memory.dmp

            Filesize

            4KB

          • memory/2028-261-0x0000000000400000-0x00000000004D4000-memory.dmp

            Filesize

            848KB

          • memory/3340-401-0x0000000010000000-0x000000001034B000-memory.dmp

            Filesize

            3.3MB

          • memory/3340-400-0x0000000010000000-0x000000001034B000-memory.dmp

            Filesize

            3.3MB

          • memory/3340-397-0x0000000010000000-0x000000001034B000-memory.dmp

            Filesize

            3.3MB

          • memory/3416-415-0x0000000010000000-0x000000001034B000-memory.dmp

            Filesize

            3.3MB

          • memory/3416-416-0x0000000073260000-0x0000000073299000-memory.dmp

            Filesize

            228KB

          • memory/3416-417-0x0000000010000000-0x000000001034B000-memory.dmp

            Filesize

            3.3MB

          • memory/3416-451-0x0000000073260000-0x0000000073299000-memory.dmp

            Filesize

            228KB

          • memory/5092-331-0x0000000010000000-0x000000001034B000-memory.dmp

            Filesize

            3.3MB

          • memory/5092-327-0x0000000010000000-0x000000001034B000-memory.dmp

            Filesize

            3.3MB

          • memory/5092-330-0x0000000010000000-0x000000001034B000-memory.dmp

            Filesize

            3.3MB