Analysis

  • max time kernel
    41s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2023 22:36

General

  • Target

    0.exe

  • Size

    71KB

  • MD5

    2a9d0d06d292a4cbbe4a95da4650ed54

  • SHA1

    44c32dfae9ac971c3651adbd82c821971a5400dc

  • SHA256

    09a1c17ac55cde962b4f3bcd61140d752d86362296ee74736000a6a647c73d8c

  • SHA512

    ed15670a18bffa1c5c1d79f1a5a653d6b2bde649164c955473580321f4ab3d048124c26e1a92e9d8ba0edaf754617d2d2c13d8db92323e09957b6de225b5314d

  • SSDEEP

    1536:jWZpTtLcWyeYd4//yEZc1GJf7/QP4uirySj5e:+pZTvnyEZiGJ7/QguiryS5e

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Deletes itself 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0.exe
    "C:\Users\Admin\AppData\Local\Temp\0.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1732
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k imgsvc
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    PID:1628
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5ed9758,0x7fef5ed9768,0x7fef5ed9778
      2⤵
        PID:2628
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1204,i,1004660670192436617,1790845279105201462,131072 /prefetch:2
        2⤵
          PID:3052
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1204,i,1004660670192436617,1790845279105201462,131072 /prefetch:8
          2⤵
            PID:2532
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1204,i,1004660670192436617,1790845279105201462,131072 /prefetch:8
            2⤵
              PID:3028
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1204,i,1004660670192436617,1790845279105201462,131072 /prefetch:1
              2⤵
                PID:1904
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1204,i,1004660670192436617,1790845279105201462,131072 /prefetch:1
                2⤵
                  PID:2164
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1336 --field-trial-handle=1204,i,1004660670192436617,1790845279105201462,131072 /prefetch:2
                  2⤵
                    PID:320
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2204 --field-trial-handle=1204,i,1004660670192436617,1790845279105201462,131072 /prefetch:1
                    2⤵
                      PID:1072
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3336 --field-trial-handle=1204,i,1004660670192436617,1790845279105201462,131072 /prefetch:8
                      2⤵
                        PID:1524
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3220 --field-trial-handle=1204,i,1004660670192436617,1790845279105201462,131072 /prefetch:8
                        2⤵
                          PID:1132
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2776 --field-trial-handle=1204,i,1004660670192436617,1790845279105201462,131072 /prefetch:8
                          2⤵
                            PID:2060
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level
                            2⤵
                              PID:1728
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fd87688,0x13fd87698,0x13fd876a8
                                3⤵
                                  PID:2528
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3828 --field-trial-handle=1204,i,1004660670192436617,1790845279105201462,131072 /prefetch:1
                                2⤵
                                  PID:2068
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:1324

                                Network

                                MITRE ATT&CK Matrix

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\747900.dll
                                  Filesize

                                  64KB

                                  MD5

                                  45dc749351fd65d71da89ca2ed2766cb

                                  SHA1

                                  e080faf81157b7f867cb56938c5e579c206af9b9

                                  SHA256

                                  391109432ba2df9f3ebc74e0144f42a490405f7c8ecb51da01b4ce793be72f25

                                  SHA512

                                  7e63d8778a4656a19397849a6edb483993f1183257fb8c0793ad4b5c625ed69d1b9472969bac6dfc98938e19baed7e3e61ab80085a1a6edd8a50ca660ce3bf74

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\0ce5091c-5e20-447e-b007-ea8abf126674.tmp
                                  Filesize

                                  180KB

                                  MD5

                                  18dcb79cd149867d04486392dd49d18d

                                  SHA1

                                  70bab15d9fd4871072ab4b162c3368706dd5d936

                                  SHA256

                                  79e61f17a5bed3de97a4bcd2fd7c5ef5db9925c64f69fd3a4536add984aa1a4c

                                  SHA512

                                  cc01a656ab34653641792108d834598f9e76dcb5c8b7e87cf04d8372ed166aa43cc0f93427fad79b9ee43c9cfc50c945b7b215b78f59c67dfe3a524624736c5c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1
                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                  Filesize

                                  527B

                                  MD5

                                  5c83ddd6497d41c30b350d35f9ed2a76

                                  SHA1

                                  4f12ac2f702a14500b70c61157c84f745be26426

                                  SHA256

                                  4289a5c15a213397f2ca07f9e097ad7310241b3c181f5a21a741dfd4c8a46113

                                  SHA512

                                  8bb8b81ac1a4b8dae39f0984c5a05dce08504c88443e058a556f260c116762595a2b3361e492e75d68806c02ada1cbecaa966ad42d756094e0ebe1642a96a4ad

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                  Filesize

                                  4KB

                                  MD5

                                  fe54c30bf42257983cb0243e6130bb6e

                                  SHA1

                                  2e026a3c737780052d3b1ab4eabc50f54219c685

                                  SHA256

                                  32b91794940f8bef4a2441e689bb2f94885abcb6607b0bfcc7171e351b61d22a

                                  SHA512

                                  71c335e64a3d3c0ed80a89667bc495ddaa843d390ef2af8978b2b2708c6278e4a45d6e0f0498f74cfadad649efe74730101cc3a02e65d7e3a06dce0c734e8a6d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp
                                  Filesize

                                  16B

                                  MD5

                                  18e723571b00fb1694a3bad6c78e4054

                                  SHA1

                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                  SHA256

                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                  SHA512

                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                  Filesize

                                  180KB

                                  MD5

                                  8bb29d715d1059c2805487b600f4c6e3

                                  SHA1

                                  fbdeba5de658b8a48d874e1b4d3da1baf21f62bd

                                  SHA256

                                  0b553ee1dc6092f6d908a689873cef5988c173072fdac58d299e90314b859ff6

                                  SHA512

                                  f905ecb5ccb65b5a501b1a8e1dbecca7e78fd1f1bb21a6842d2fa05dacc28f6c9f370fe474f43d41b54ad39f65d4d200f5ba2d188b5e1cd2dd3017bca468e813

                                • C:\Windows\FileName.jpg
                                  Filesize

                                  86KB

                                  MD5

                                  f723677ab9ef8f33f966a15971642b82

                                  SHA1

                                  bd5df1b5b6b5816d2b9b066dd6b019f669e99bfe

                                  SHA256

                                  d8f74b5e6c272903442735b3f7889a054686a5b5adf20adb4d14c2b4ed7f0b55

                                  SHA512

                                  985fc6dadbb4cb45f497d38cf6c0d39596b7bdee1e835ff415ff76767bb799dedbd9bdc9ac0521369089b1af98cbc884342af6020a7095861e2dff92dfed613e

                                • \??\c:\NT_Path.jpg
                                  Filesize

                                  53B

                                  MD5

                                  4d70854b2184df59f900282804bd0cc6

                                  SHA1

                                  2f7f9d487f1a8b96f83a5cabe98e3f7b2df77d08

                                  SHA256

                                  234bd2efd9ac27b8430beea95397adc03e20072446a056d921f47d5e2a156428

                                  SHA512

                                  7873566cc648fb0e1b39cbe70df07e3ff8c95ee33761992dfd006730e9f985d87a1c39aa6d57fea05fa327da89cdc9652c68bae6da237ad9aea13348fa70db52

                                • \??\c:\windows\filename.jpg
                                  Filesize

                                  12.0MB

                                  MD5

                                  3445d51be5a621228973de31651f576b

                                  SHA1

                                  cc2e3d59d849511dc06022f5ca8fef1a92e245b1

                                  SHA256

                                  73bae003c769fb6c466fc852c52bc2e61c5b29581b6b2ff4f8784eaba06dd1f5

                                  SHA512

                                  fe85f66c8b3962aa4f6eba407d6260f6b09ddb11d630d7a570b561b184de490f6daa9c925672e88a4e3336e0a88beb15401efcf06ca1066dfaa661e1a7286375

                                • \??\pipe\crashpad_2228_VVHDYZUOADALAEZY
                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • memory/1732-0-0x0000000000400000-0x0000000000413000-memory.dmp
                                  Filesize

                                  76KB