Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 22:58

General

  • Target

    41b3f3238ed87a35ea06e99b8ca9d58a.exe

  • Size

    155KB

  • MD5

    41b3f3238ed87a35ea06e99b8ca9d58a

  • SHA1

    ac7ad3508f04530769cd52d7a723bb067dd8c203

  • SHA256

    758d6af1bc6a7c011e5a8edf2c5cc3e20749324afe62a69faff2c92372b478de

  • SHA512

    4b3111db61bad7dcbf5531dc091d2e924547c42cccb085e4a60e0f4d482af1d10f7c6ae4064f3660da4f37383665577855d172eb2fd08a37eebf3a7932b1ee01

  • SSDEEP

    3072:5nzK5S9ERdbsJd84Qc/whoGmip8ntWkgnG7CudC:5qsJeb1m2kwkgGmK

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41b3f3238ed87a35ea06e99b8ca9d58a.exe
    "C:\Users\Admin\AppData\Local\Temp\41b3f3238ed87a35ea06e99b8ca9d58a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /im Ksafetray.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4820
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k imgsvc
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    PID:788

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\Centerv.gzip

    Filesize

    2.5MB

    MD5

    eda843f78ad809e1c5a843b5e315956f

    SHA1

    771a5df2fa7e68b9be800458f107c5ca280c219e

    SHA256

    44dd2d7d230875e40569cbefa6a631634ee14970ae7e9f9ef31adab068fe3677

    SHA512

    ed7511585d487c6c4b51cb1ceda4588bdb52e1dfeb30fc7f8e2ad1c9c7404ad8b4119d58c74f987e2e060a614bb0c9c8c307e22762d58de2fb1268f73f26b668

  • C:\Windows\Prefetch3118600.dll

    Filesize

    148KB

    MD5

    ba45c1783e8cda7e1a1df06e31ac2bb8

    SHA1

    4a7dacd6f9df249a2bdf0a804e847f4efd50f920

    SHA256

    73bed1b3ed15943f49b86a60ecd2fa86455c873ef3fede98126d346e31df8e4b

    SHA512

    edde4c7be9280f1f468bb4af15eca19ea720a92590bbe8148f3ca7b29c228fcf5560c2faabf1b5e46c3b36b718987a8759da5365b153d7d5a3002f8297022abc

  • \??\c:\Program Files\NT_Path.gif

    Filesize

    101B

    MD5

    80729f0b1936e65f041fbd95a6b299af

    SHA1

    09a739028511e717591573a5d750c588a4af20bf

    SHA256

    db564f15f734bf7292de56576b55660d93fee24175d1d33dbddbe20a12162df3

    SHA512

    fd1d1e0d6fdd78f7d5e2e7c538ac403cb4eb28480ac7325c532656e9d0045c6f6a17bbc764866604d4606680a4e109ae707ee237eb86a58790e5ce34423cdf68

  • \??\c:\program files (x86)\common files\centerv.gzip

    Filesize

    2.8MB

    MD5

    0746746dea3cec3a3ecdcd8615fefb68

    SHA1

    2b8d95a68653b073b294e23dbbcc1721b08b06ca

    SHA256

    54a22c2dbca1f2f9fbbe9cb46819d7585d35ee82ec4cfae0bf1c3ca89e99c777

    SHA512

    cbadc1eaea23cfb74a76197fc0cd723c944c6fcb1e5745773d67f56166e8a71f830aa07ba4a0c55fc525a2473e0bd703ec7b3bc1a3fd10bcd66cff27145d7b90

  • memory/4880-0-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/4880-13-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB