Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    31-08-2023 12:57

General

  • Target

    bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe

  • Size

    2.3MB

  • MD5

    0d004b7cca6b78d29c628532127754e9

  • SHA1

    3fdb73a40f075e33aaf18008b35be817c10b9977

  • SHA256

    bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb

  • SHA512

    450fcd7863ca9ea6c02ed6181a547a32bb08124079c7b2dccd62ca71bf564e22d7ed0fd23f4c77bbd34b462d027fff452a9e1dc11cc4b0a146d388207b7f88d7

  • SSDEEP

    49152:QAR6pHImCXi45lSevpEie7zoQY49aXZmMAXh4plixja8dTeJPlXmB+giUS:QwI7Wl5Yei1ox49unmJZa8d6JPlXDgiz

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe
    "C:\Users\Admin\AppData\Local\Temp\bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\system32\cmd.exe
      cmd.exe /c set
      2⤵
        PID:2632
      • C:\Users\Admin\AppData\Local\Temp\~3033728207270814775~\sg.tmp
        7zG_exe x "C:\Users\Admin\AppData\Local\Temp\bfe098da37f3cc3ef08e7cefc2b000a1043ff2b1819cc9d1771bc628f5e98fbb.exe" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\~4150941742143186784"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2824
      • C:\Users\Admin\AppData\Local\Temp\~4150941742143186784\wininit.exe
        "C:\Users\Admin\AppData\Local\Temp\~4150941742143186784\wininit.exe"
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:3024

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~3033728207270814775~\sg.tmp

      Filesize

      715KB

      MD5

      7c4718943bd3f66ebdb47ccca72c7b1e

      SHA1

      f9edfaa7adb8fa528b2e61b2b251f18da10a6969

      SHA256

      4cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc

      SHA512

      e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516

    • C:\Users\Admin\AppData\Local\Temp\~4150941742143186784\wininit.exe

      Filesize

      1.0MB

      MD5

      9c721b69789898a419d8186f34c87bb7

      SHA1

      54d92bc23c738a23319d2dd4ed7f81af54dc5791

      SHA256

      3b90af072c31d14ef08f4b18faa18841aee45a21e0c6186369ad7a0faf3d98c5

      SHA512

      646cc1e1f21363941d85a4935bb1e58d1f729ca9f67f180c35f638cdaecdc27aa17e5b7c693ba0ee481fed125df89f8620c37f70ac16d32c3ca6fb8963b4f0ae

    • C:\Users\Admin\AppData\Local\Temp\~4150941742143186784\wininit.exe

      Filesize

      1.0MB

      MD5

      9c721b69789898a419d8186f34c87bb7

      SHA1

      54d92bc23c738a23319d2dd4ed7f81af54dc5791

      SHA256

      3b90af072c31d14ef08f4b18faa18841aee45a21e0c6186369ad7a0faf3d98c5

      SHA512

      646cc1e1f21363941d85a4935bb1e58d1f729ca9f67f180c35f638cdaecdc27aa17e5b7c693ba0ee481fed125df89f8620c37f70ac16d32c3ca6fb8963b4f0ae

    • \Users\Admin\AppData\Local\Temp\~3033728207270814775~\sg.tmp

      Filesize

      715KB

      MD5

      7c4718943bd3f66ebdb47ccca72c7b1e

      SHA1

      f9edfaa7adb8fa528b2e61b2b251f18da10a6969

      SHA256

      4cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc

      SHA512

      e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516

    • \Users\Admin\AppData\Local\Temp\~4150941742143186784\wininit.exe

      Filesize

      1.0MB

      MD5

      9c721b69789898a419d8186f34c87bb7

      SHA1

      54d92bc23c738a23319d2dd4ed7f81af54dc5791

      SHA256

      3b90af072c31d14ef08f4b18faa18841aee45a21e0c6186369ad7a0faf3d98c5

      SHA512

      646cc1e1f21363941d85a4935bb1e58d1f729ca9f67f180c35f638cdaecdc27aa17e5b7c693ba0ee481fed125df89f8620c37f70ac16d32c3ca6fb8963b4f0ae

    • \Users\Admin\AppData\Local\Temp\~4150941742143186784\wininit.exe

      Filesize

      1.0MB

      MD5

      9c721b69789898a419d8186f34c87bb7

      SHA1

      54d92bc23c738a23319d2dd4ed7f81af54dc5791

      SHA256

      3b90af072c31d14ef08f4b18faa18841aee45a21e0c6186369ad7a0faf3d98c5

      SHA512

      646cc1e1f21363941d85a4935bb1e58d1f729ca9f67f180c35f638cdaecdc27aa17e5b7c693ba0ee481fed125df89f8620c37f70ac16d32c3ca6fb8963b4f0ae

    • memory/2316-15-0x0000000002EA0000-0x00000000030DC000-memory.dmp

      Filesize

      2.2MB

    • memory/2316-17-0x0000000002EA0000-0x00000000030DC000-memory.dmp

      Filesize

      2.2MB

    • memory/3024-16-0x0000000000400000-0x000000000063C000-memory.dmp

      Filesize

      2.2MB

    • memory/3024-19-0x00000000001C0000-0x00000000001C8000-memory.dmp

      Filesize

      32KB

    • memory/3024-18-0x0000000000400000-0x000000000063C000-memory.dmp

      Filesize

      2.2MB

    • memory/3024-20-0x0000000010000000-0x000000001018B000-memory.dmp

      Filesize

      1.5MB

    • memory/3024-30-0x0000000000400000-0x000000000063C000-memory.dmp

      Filesize

      2.2MB