Overview
overview
10Static
static
71111111111...11.exe
windows7-x64
61111111111...11.exe
windows10-1703-x64
61111111111...11.exe
windows10-2004-x64
69VIcoCiitn.exe
windows7-x64
69VIcoCiitn.exe
windows10-1703-x64
69VIcoCiitn.exe
windows10-2004-x64
1Microsoft Windows.exe
windows7-x64
10Microsoft Windows.exe
windows10-1703-x64
10Microsoft Windows.exe
windows10-2004-x64
10New.exe
windows7-x64
7New.exe
windows10-1703-x64
7New.exe
windows10-2004-x64
7SBLlgcMqPg.exe
windows7-x64
10SBLlgcMqPg.exe
windows10-1703-x64
10SBLlgcMqPg.exe
windows10-2004-x64
10hh.chm
windows7-x64
10hh.chm
windows10-1703-x64
8hh.chm
windows10-2004-x64
8nY4Ke1JkQH.exe
windows7-x64
10nY4Ke1JkQH.exe
windows10-1703-x64
10nY4Ke1JkQH.exe
windows10-2004-x64
10qnr.dll
windows7-x64
3qnr.dll
windows10-1703-x64
3qnr.dll
windows10-2004-x64
3˫װ.exe
windows7-x64
7˫װ.exe
windows10-1703-x64
7˫װ.exe
windows10-2004-x64
7�...װ.exe
windows7-x64
7�...װ.exe
windows10-1703-x64
7�...װ.exe
windows10-2004-x64
7Analysis
-
max time kernel
122s -
max time network
296s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-10-2023 09:07
Behavioral task
behavioral1
Sample
1111111111111111111111.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1111111111111111111111.exe
Resource
win10-20230915-en
Behavioral task
behavioral3
Sample
1111111111111111111111.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
9VIcoCiitn.exe
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
9VIcoCiitn.exe
Resource
win10-20230915-en
Behavioral task
behavioral6
Sample
9VIcoCiitn.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Microsoft Windows.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Microsoft Windows.exe
Resource
win10-20230915-en
Behavioral task
behavioral9
Sample
Microsoft Windows.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
New.exe
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
New.exe
Resource
win10-20230915-en
Behavioral task
behavioral12
Sample
New.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
SBLlgcMqPg.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
SBLlgcMqPg.exe
Resource
win10-20230915-en
Behavioral task
behavioral15
Sample
SBLlgcMqPg.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
hh.chm
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
hh.chm
Resource
win10-20230915-en
Behavioral task
behavioral18
Sample
hh.chm
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
nY4Ke1JkQH.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
nY4Ke1JkQH.exe
Resource
win10-20230915-en
Behavioral task
behavioral21
Sample
nY4Ke1JkQH.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
qnr.dll
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
qnr.dll
Resource
win10-20230915-en
Behavioral task
behavioral24
Sample
qnr.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
˫װ.exe
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
˫װ.exe
Resource
win10-20230915-en
Behavioral task
behavioral27
Sample
˫װ.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
ٷѰװ.exe
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
ٷѰװ.exe
Resource
win10-20230831-en
Behavioral task
behavioral30
Sample
ٷѰװ.exe
Resource
win10v2004-20230915-en
General
-
Target
nY4Ke1JkQH.exe
-
Size
214KB
-
MD5
415e87055596d88f1793be910abe60aa
-
SHA1
3182b59a3063df587987a6bc6f7e39c42c075e8f
-
SHA256
399e60f78e458f5e010da46a45c66ccf9b0fd30c128234a5dd9d9c9aa32ffa27
-
SHA512
4129ed2744ee101e22aefc63e495ddb2b877ae33d4d8aa957992bad9ea46896256c2272597e6c82d6ad94dc6dea24af0e3e706bdaa0b76d0e158b002597feda3
-
SSDEEP
3072:9kIcMtRin3zIf6naro5T6zaKPCbd5XX4E1Tgmn8Y5W646CN:9PPtRJ6NeKfocpnJ5W64
Malware Config
Extracted
gh0strat
154.221.25.208
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral19/memory/2528-27-0x0000000010000000-0x000000001000B000-memory.dmp family_gh0strat behavioral19/memory/2528-30-0x0000000000400000-0x0000000000413000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2560 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2800 cmd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" nY4Ke1JkQH.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: vbc.exe File opened (read-only) \??\P: vbc.exe File opened (read-only) \??\V: vbc.exe File opened (read-only) \??\B: vbc.exe File opened (read-only) \??\L: vbc.exe File opened (read-only) \??\M: vbc.exe File opened (read-only) \??\X: vbc.exe File opened (read-only) \??\Y: vbc.exe File opened (read-only) \??\J: vbc.exe File opened (read-only) \??\T: vbc.exe File opened (read-only) \??\W: vbc.exe File opened (read-only) \??\N: vbc.exe File opened (read-only) \??\R: vbc.exe File opened (read-only) \??\U: vbc.exe File opened (read-only) \??\I: vbc.exe File opened (read-only) \??\K: vbc.exe File opened (read-only) \??\Q: vbc.exe File opened (read-only) \??\S: vbc.exe File opened (read-only) \??\Z: vbc.exe File opened (read-only) \??\E: vbc.exe File opened (read-only) \??\G: vbc.exe File opened (read-only) \??\H: vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2560 set thread context of 2528 2560 svchost.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz vbc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2768 timeout.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2608 nY4Ke1JkQH.exe 2608 nY4Ke1JkQH.exe 2560 svchost.exe 2560 svchost.exe 2560 svchost.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe 2528 vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2608 nY4Ke1JkQH.exe Token: SeDebugPrivilege 2560 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2528 vbc.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2380 2608 nY4Ke1JkQH.exe 28 PID 2608 wrote to memory of 2380 2608 nY4Ke1JkQH.exe 28 PID 2608 wrote to memory of 2380 2608 nY4Ke1JkQH.exe 28 PID 2608 wrote to memory of 2380 2608 nY4Ke1JkQH.exe 28 PID 2608 wrote to memory of 2800 2608 nY4Ke1JkQH.exe 30 PID 2608 wrote to memory of 2800 2608 nY4Ke1JkQH.exe 30 PID 2608 wrote to memory of 2800 2608 nY4Ke1JkQH.exe 30 PID 2608 wrote to memory of 2800 2608 nY4Ke1JkQH.exe 30 PID 2380 wrote to memory of 2820 2380 cmd.exe 32 PID 2380 wrote to memory of 2820 2380 cmd.exe 32 PID 2380 wrote to memory of 2820 2380 cmd.exe 32 PID 2380 wrote to memory of 2820 2380 cmd.exe 32 PID 2800 wrote to memory of 2768 2800 cmd.exe 33 PID 2800 wrote to memory of 2768 2800 cmd.exe 33 PID 2800 wrote to memory of 2768 2800 cmd.exe 33 PID 2800 wrote to memory of 2768 2800 cmd.exe 33 PID 2800 wrote to memory of 2560 2800 cmd.exe 34 PID 2800 wrote to memory of 2560 2800 cmd.exe 34 PID 2800 wrote to memory of 2560 2800 cmd.exe 34 PID 2800 wrote to memory of 2560 2800 cmd.exe 34 PID 2560 wrote to memory of 1220 2560 svchost.exe 35 PID 2560 wrote to memory of 1220 2560 svchost.exe 35 PID 2560 wrote to memory of 1220 2560 svchost.exe 35 PID 2560 wrote to memory of 1220 2560 svchost.exe 35 PID 2560 wrote to memory of 2636 2560 svchost.exe 36 PID 2560 wrote to memory of 2636 2560 svchost.exe 36 PID 2560 wrote to memory of 2636 2560 svchost.exe 36 PID 2560 wrote to memory of 2636 2560 svchost.exe 36 PID 2560 wrote to memory of 2580 2560 svchost.exe 37 PID 2560 wrote to memory of 2580 2560 svchost.exe 37 PID 2560 wrote to memory of 2580 2560 svchost.exe 37 PID 2560 wrote to memory of 2580 2560 svchost.exe 37 PID 2560 wrote to memory of 2528 2560 svchost.exe 38 PID 2560 wrote to memory of 2528 2560 svchost.exe 38 PID 2560 wrote to memory of 2528 2560 svchost.exe 38 PID 2560 wrote to memory of 2528 2560 svchost.exe 38 PID 2560 wrote to memory of 2528 2560 svchost.exe 38 PID 2560 wrote to memory of 2528 2560 svchost.exe 38 PID 2560 wrote to memory of 2528 2560 svchost.exe 38 PID 2560 wrote to memory of 2528 2560 svchost.exe 38 PID 2560 wrote to memory of 2528 2560 svchost.exe 38 PID 2560 wrote to memory of 2528 2560 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\nY4Ke1JkQH.exe"C:\Users\Admin\AppData\Local\Temp\nY4Ke1JkQH.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp390A.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2768
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInUtil.exe"4⤵PID:1220
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Microsoft.Workflow.Compiler.exe"4⤵PID:2636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\dfsvc.exe"4⤵PID:2580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2528
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5a299045aeab36337517068076d6a20f4
SHA19fadd07064aa56185282ab4dbaf2851aff84e5c5
SHA2563c134d57c5a6bd0da9ab056c583d259acd3490fbe22f38eb149087ff5d260c2a
SHA512954c4060b08a6664b35c5fd031ba460bb6bc74de2e2dbf0c3139bbe4764d0fbf8ffb9a529c344bf443723c1b8af083b656af0caae08d3faeae8b18bbda72e5cf
-
Filesize
151B
MD5a299045aeab36337517068076d6a20f4
SHA19fadd07064aa56185282ab4dbaf2851aff84e5c5
SHA2563c134d57c5a6bd0da9ab056c583d259acd3490fbe22f38eb149087ff5d260c2a
SHA512954c4060b08a6664b35c5fd031ba460bb6bc74de2e2dbf0c3139bbe4764d0fbf8ffb9a529c344bf443723c1b8af083b656af0caae08d3faeae8b18bbda72e5cf
-
Filesize
214KB
MD5415e87055596d88f1793be910abe60aa
SHA13182b59a3063df587987a6bc6f7e39c42c075e8f
SHA256399e60f78e458f5e010da46a45c66ccf9b0fd30c128234a5dd9d9c9aa32ffa27
SHA5124129ed2744ee101e22aefc63e495ddb2b877ae33d4d8aa957992bad9ea46896256c2272597e6c82d6ad94dc6dea24af0e3e706bdaa0b76d0e158b002597feda3
-
Filesize
214KB
MD5415e87055596d88f1793be910abe60aa
SHA13182b59a3063df587987a6bc6f7e39c42c075e8f
SHA256399e60f78e458f5e010da46a45c66ccf9b0fd30c128234a5dd9d9c9aa32ffa27
SHA5124129ed2744ee101e22aefc63e495ddb2b877ae33d4d8aa957992bad9ea46896256c2272597e6c82d6ad94dc6dea24af0e3e706bdaa0b76d0e158b002597feda3
-
Filesize
214KB
MD5415e87055596d88f1793be910abe60aa
SHA13182b59a3063df587987a6bc6f7e39c42c075e8f
SHA256399e60f78e458f5e010da46a45c66ccf9b0fd30c128234a5dd9d9c9aa32ffa27
SHA5124129ed2744ee101e22aefc63e495ddb2b877ae33d4d8aa957992bad9ea46896256c2272597e6c82d6ad94dc6dea24af0e3e706bdaa0b76d0e158b002597feda3