Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2023 20:53

General

  • Target

    NEAS.e30e947c000a0e11c6b8a285a7013cd10ea55af42be787c54822bd91d94c6400_JC.exe

  • Size

    673KB

  • MD5

    484ab79215e73743053556b128a60ef0

  • SHA1

    74500943aec7c38764a6b7b6babf9ffbdd440c27

  • SHA256

    e30e947c000a0e11c6b8a285a7013cd10ea55af42be787c54822bd91d94c6400

  • SHA512

    e1ad76c0b0116c0431c9a3befdca6555df5ee0583474075720bf94c26ab9fa4e0ca582b9f28ba91a92080fa2b1677d7269ce6e970fa56abcb9dddc0364949356

  • SSDEEP

    12288:FW5tTEdPGYqEOc4POXmH8GI0duC77jDb0PUH:F8Eo6OcUODWxTH

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.e30e947c000a0e11c6b8a285a7013cd10ea55af42be787c54822bd91d94c6400_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.e30e947c000a0e11c6b8a285a7013cd10ea55af42be787c54822bd91d94c6400_JC.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Users\Public\VAxplorer\VAxplorer.exe
      "C:\Users\Public\VAxplorer\VAxplorer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Drops file in Windows directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\VAxplorer\PEx64.DLL

    Filesize

    408KB

    MD5

    f1ecccf56f0161245cf531ed03e9a782

    SHA1

    6db1bba372437d54f9e6d79f4bfb12ecc510235a

    SHA256

    1317dec4136b6f8ebddaf1afaee75c00da642756edc1daaf338a3fd84a7f4edf

    SHA512

    cfde07c301f95225e9677f0deaf14f29d7916c43f109ca2bd0bfefb5504b56a7ae3ac6af6cc7d339fca26c4e53860572277cc1d26bc51eed42543d45438e3d34

  • C:\Users\Public\VAxplorer\PEx64.dll

    Filesize

    408KB

    MD5

    f1ecccf56f0161245cf531ed03e9a782

    SHA1

    6db1bba372437d54f9e6d79f4bfb12ecc510235a

    SHA256

    1317dec4136b6f8ebddaf1afaee75c00da642756edc1daaf338a3fd84a7f4edf

    SHA512

    cfde07c301f95225e9677f0deaf14f29d7916c43f109ca2bd0bfefb5504b56a7ae3ac6af6cc7d339fca26c4e53860572277cc1d26bc51eed42543d45438e3d34

  • C:\Users\Public\VAxplorer\SvrMgrInterface.dll

    Filesize

    7.1MB

    MD5

    bf05cfb57a804d204f53466a65eb0f8d

    SHA1

    8f9c318c65185e35b923a310b6d13fec3cc34189

    SHA256

    acdf30226741829ef71762d989c46137f30e8289f72282e480a849ecaddec18b

    SHA512

    35628f90206c7335a322699ae90d9b55a57a9c120f8085e69b48d9782e46a5c666ff41d0af5de3354e4078ba272dab7db5f7ce82365ce9fe637b8f0506ea7f9e

  • C:\Users\Public\VAxplorer\SvrMgrInterface.dll

    Filesize

    7.1MB

    MD5

    bf05cfb57a804d204f53466a65eb0f8d

    SHA1

    8f9c318c65185e35b923a310b6d13fec3cc34189

    SHA256

    acdf30226741829ef71762d989c46137f30e8289f72282e480a849ecaddec18b

    SHA512

    35628f90206c7335a322699ae90d9b55a57a9c120f8085e69b48d9782e46a5c666ff41d0af5de3354e4078ba272dab7db5f7ce82365ce9fe637b8f0506ea7f9e

  • C:\Users\Public\VAxplorer\VAxplorer.dat

    Filesize

    61B

    MD5

    9c9334ec2c1d97efd49b60d1ec5786e9

    SHA1

    9670ab321ee35578f3bf6d835a0c0fd5ed340f1c

    SHA256

    3d6fc2183a0b3ea713d750878aa02e3fefd0861c095c8ebec5fa2a069c24c5d1

    SHA512

    af7ce330841d990165207b72c16e34310d2af590668ba0f27270d422d12f36da306855a118d6014af6445bf19f6e71b768ac1a041bc034b5607cbf5a76201358

  • C:\Users\Public\VAxplorer\VAxplorer.exe

    Filesize

    133KB

    MD5

    46ef5c93d32489b5e213d2af3f3b01b5

    SHA1

    011f0cd2bdfd1e10c9058a67e0f6822ae30229f4

    SHA256

    49e19a75210a72dc9b7055b6a07313d5c43b2467c117664f84032bcb0a66db73

    SHA512

    0058d6904599a9eadb0fafb30196bf49aa71e23000e5c692a83ccffa21f12ae4988859e94c7402445f70b4b0e1a5cf5776f8aa4d8e31e54e7470f27d6da8beae

  • C:\Users\Public\VAxplorer\VAxplorer.exe

    Filesize

    133KB

    MD5

    46ef5c93d32489b5e213d2af3f3b01b5

    SHA1

    011f0cd2bdfd1e10c9058a67e0f6822ae30229f4

    SHA256

    49e19a75210a72dc9b7055b6a07313d5c43b2467c117664f84032bcb0a66db73

    SHA512

    0058d6904599a9eadb0fafb30196bf49aa71e23000e5c692a83ccffa21f12ae4988859e94c7402445f70b4b0e1a5cf5776f8aa4d8e31e54e7470f27d6da8beae

  • C:\Users\Public\VAxplorer\VAxplorer.exe

    Filesize

    133KB

    MD5

    46ef5c93d32489b5e213d2af3f3b01b5

    SHA1

    011f0cd2bdfd1e10c9058a67e0f6822ae30229f4

    SHA256

    49e19a75210a72dc9b7055b6a07313d5c43b2467c117664f84032bcb0a66db73

    SHA512

    0058d6904599a9eadb0fafb30196bf49aa71e23000e5c692a83ccffa21f12ae4988859e94c7402445f70b4b0e1a5cf5776f8aa4d8e31e54e7470f27d6da8beae

  • C:\Users\Public\VAxplorer\donottrace.txt

    Filesize

    576KB

    MD5

    8853f388a31dfcf9f6d4a48c0568322c

    SHA1

    5a41c42845a03ec7033efbccc2c0800ac50758ba

    SHA256

    647d152ffb59cffa15ef2e346541ae0437c0e689e0486ebf1f47c4694a5a8f92

    SHA512

    bcdc834c212ed0391af234b5cc651bd71a82725d0cbdcfba8a87cfad344cba6dc6ba48c1c37a85d0a3a17ecefa4a728d26b4fc3200b2d0017a2c42bef8960edb

  • C:\Users\Public\VAxplorer\task.dat

    Filesize

    84B

    MD5

    1ebeb91405a354285c9d643a2cb621f2

    SHA1

    6c955ba873e395e1b771358b6690dbd97cb25f5e

    SHA256

    80e46e97f02a2a84581d011518b76a0d5054f423e93dc30a4e0816a425c6677f

    SHA512

    5be85e38d96a43e44eb9cf66e45af067a3a9464ac55711f5b9aab424a53e2be92462ed289a09a82cebc6aa002c52d4e4b04a757b1bcaf31aa22f173af93f353c

  • memory/2020-25-0x0000000003060000-0x00000000030F6000-memory.dmp

    Filesize

    600KB

  • memory/2020-26-0x0000000003060000-0x00000000030F6000-memory.dmp

    Filesize

    600KB

  • memory/2020-28-0x0000000002F20000-0x0000000002F9B000-memory.dmp

    Filesize

    492KB

  • memory/2020-45-0x0000000003060000-0x00000000030F6000-memory.dmp

    Filesize

    600KB