Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 16:58

General

  • Target

    01ed18a077b02c571e110faa1d745ac6.exe

  • Size

    383KB

  • MD5

    01ed18a077b02c571e110faa1d745ac6

  • SHA1

    c550ab3f75bbd18b385b84c8cbeaf60b2be294e9

  • SHA256

    7dc5ca83aefa08fb9a75e566cb2af29e62ce7630589a8d2c85786b765d192c42

  • SHA512

    12ab5d39aa7cd19cb25c42b7f0027fdc48d1e0509d89d2bf736a62c8324a070f9bb1f14a490d9993b4a6da0e989c5edd25715d6b5be5aed7c33b1120a1a52ebf

  • SSDEEP

    6144:1MZSvkDbBjX4MF2idZecnl20lHRxp3gwncduD7yB9VCO6Sco4q8+dE6CqTQLyYg:WsvkD9jIsF3Z4mxxjDqVTVOCcLyYg

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Drops file in Drivers directory 2 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01ed18a077b02c571e110faa1d745ac6.exe
    "C:\Users\Admin\AppData\Local\Temp\01ed18a077b02c571e110faa1d745ac6.exe"
    1⤵
    • Drops file in Drivers directory
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Drops file in System32 directory
    PID:2040
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Drops file in Drivers directory
    • Deletes itself
    • Loads dropped DLL
    PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\release.tmp

    Filesize

    95KB

    MD5

    c6e51fa9b6d2b395384a68be77cdaa5e

    SHA1

    8ae0b4d26c941880957c778541b3d07e722be7fa

    SHA256

    0f757074c19baf9cf80c65697150981813983d154965c9e78fa0951bdedd9c5d

    SHA512

    7f410da44df864467366a9ba66680b1147ebe93ec55e7fe2f6c90ee89d659f8bae6017c840f4518001a7f6c59eb900e1e7b7ee08ab23a128f28d53f43f2f0388

  • C:\Windows\SysWOW64\install.tmp

    Filesize

    70B

    MD5

    2a01885fd246b3d9a1882a0fff1a8094

    SHA1

    42f22c9f6cbc084af235af7fef431227c4a78064

    SHA256

    2f5d67fdb3f18d52cf190ac2e40b47b197c0c88fdeb840ca8a1d0846a663b8ac

    SHA512

    8ead54be32f63a0b3ddef64aa7a2abab6070fb6871ea3d92d46fd5cfa6f7c3464816b949e5e062faec644a34e9622823afb521fa53ceae88603d5f966c9646ab

  • \Users\Admin\AppData\Local\Temp\dll.tmp

    Filesize

    95KB

    MD5

    8a416eb17fc2c3e3f6e593cd2b8a0722

    SHA1

    e36e61e0ecc7c0fdfb0cb863c248d8fd159a0f00

    SHA256

    76900af9d55d26062de3903ed69f7fc0897fdc32ea0a87aece9e9f98f0f6edcd

    SHA512

    aa27bede562ab4b361a3dd74de82d66d082312d3097834d92d7743d1b25c4261a1ba4e2b7359687694ed193ff0b426d4c9a8fc47f1ea21fd491d53c6e2e6a5d1

  • memory/2040-25-0x0000000000600000-0x0000000000601000-memory.dmp

    Filesize

    4KB

  • memory/2040-23-0x0000000001E00000-0x0000000001E01000-memory.dmp

    Filesize

    4KB

  • memory/2040-5-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2040-6-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2040-8-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2040-9-0x0000000003190000-0x0000000003191000-memory.dmp

    Filesize

    4KB

  • memory/2040-7-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/2040-10-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2040-11-0x0000000003180000-0x0000000003182000-memory.dmp

    Filesize

    8KB

  • memory/2040-28-0x0000000001E70000-0x0000000001E71000-memory.dmp

    Filesize

    4KB

  • memory/2040-16-0x0000000000610000-0x0000000000611000-memory.dmp

    Filesize

    4KB

  • memory/2040-17-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

    Filesize

    4KB

  • memory/2040-18-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/2040-19-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/2040-20-0x0000000001DE0000-0x0000000001DE1000-memory.dmp

    Filesize

    4KB

  • memory/2040-21-0x0000000001DD0000-0x0000000001DD1000-memory.dmp

    Filesize

    4KB

  • memory/2040-26-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/2040-0-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2040-4-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2040-3-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2040-12-0x0000000000630000-0x0000000000631000-memory.dmp

    Filesize

    4KB

  • memory/2040-27-0x0000000001E90000-0x0000000001E91000-memory.dmp

    Filesize

    4KB

  • memory/2040-29-0x0000000001E20000-0x0000000001E21000-memory.dmp

    Filesize

    4KB

  • memory/2040-30-0x00000000022C0000-0x00000000022C1000-memory.dmp

    Filesize

    4KB

  • memory/2040-31-0x00000000022B0000-0x00000000022B1000-memory.dmp

    Filesize

    4KB

  • memory/2040-32-0x00000000031D0000-0x00000000031D1000-memory.dmp

    Filesize

    4KB

  • memory/2040-33-0x0000000003170000-0x0000000003173000-memory.dmp

    Filesize

    12KB

  • memory/2040-34-0x0000000000350000-0x0000000000352000-memory.dmp

    Filesize

    8KB

  • memory/2040-37-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2040-36-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2040-40-0x00000000031A0000-0x00000000031A1000-memory.dmp

    Filesize

    4KB

  • memory/2040-39-0x00000000031B0000-0x00000000031B1000-memory.dmp

    Filesize

    4KB

  • memory/2040-38-0x00000000031C0000-0x00000000031C1000-memory.dmp

    Filesize

    4KB

  • memory/2040-35-0x00000000031E0000-0x00000000031E1000-memory.dmp

    Filesize

    4KB

  • memory/2040-2-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2040-48-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/2040-50-0x00000000002E0000-0x0000000000334000-memory.dmp

    Filesize

    336KB

  • memory/2040-1-0x00000000002E0000-0x0000000000334000-memory.dmp

    Filesize

    336KB