Analysis

  • max time kernel
    36s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 18:32

General

  • Target

    34c2d37434cb06c2874a49419d59ab45.exe

  • Size

    228KB

  • MD5

    34c2d37434cb06c2874a49419d59ab45

  • SHA1

    262fdec6d7ce86ddf2fbf35ec0fa466522bd9428

  • SHA256

    48de6adcb1e991d01fde17b73ec8e5441644e08065ff224bbd53dfbdf51d19d5

  • SHA512

    ab355b7eebbe651ad4681a89d8e46b0ec02eb1940a7110323a04a091dd439b3b888c86f7a88ecbc0ff8581e4340b54b670b318eec5d748bd8d89c923bc7df516

  • SSDEEP

    6144:93ouBn5oP8qxFrthTZW2665Qu46uYF4gK4:7Bn5oP8qxFrXv665Qu46uYe

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34c2d37434cb06c2874a49419d59ab45.exe
    "C:\Users\Admin\AppData\Local\Temp\34c2d37434cb06c2874a49419d59ab45.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Sofe0\appapp.exe
      C:\Sofe0\appapp.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:3028
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c afc9fe2f418b00a0.bat
      2⤵
      • Deletes itself
      PID:2592
    • C:\Windows\SysWOW64\sc.exe
      sc config DcomLaunch start= auto
      2⤵
      • Launches sc.exe
      PID:2564
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Sofe0\common\lanmao.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2556
    • C:\Windows\SysWOW64\cscript.exe
      cscript.exe "C:\WINDOWS\system32\brilgrwjgksojrwmspk.vbs"
      2⤵
        PID:2708
    • C:\Windows\SysWOW64\cacls.exe
      cacls "C:\Users\Admin\AppData\Local\Temp" /T /P everyone:F
      1⤵
        PID:2868
      • C:\Windows\SysWOW64\attrib.exe
        attrib +H +R "C:\Sofe0"
        1⤵
        • Views/modifies file attributes
        PID:2900
      • C:\Windows\SysWOW64\cacls.exe
        cacls "C:\Users\Admin\AppData\Local\Temp\84018c44d2a03266a0e95d07765bde86.dat" /T /P everyone:N
        1⤵
          PID:1224
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo y"
          1⤵
            PID:2436
          • C:\Windows\SysWOW64\attrib.exe
            attrib +H +R "C:\Users\Admin\AppData\Local\Temp\84018c44d2a03266a0e95d07765bde86.dat"
            1⤵
            • Views/modifies file attributes
            PID:2632
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo y"
            1⤵
              PID:2780

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/3028-18-0x0000000020000000-0x0000000020027000-memory.dmp

              Filesize

              156KB

            • memory/3064-2-0x0000000000230000-0x0000000000269000-memory.dmp

              Filesize

              228KB

            • memory/3064-1-0x0000000000230000-0x0000000000269000-memory.dmp

              Filesize

              228KB

            • memory/3064-0-0x0000000000400000-0x0000000000438484-memory.dmp

              Filesize

              225KB

            • memory/3064-35-0x0000000000400000-0x0000000000438484-memory.dmp

              Filesize

              225KB