Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2024, 14:38

General

  • Target

    38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe

  • Size

    3.5MB

  • MD5

    9faace482045ab5df714a1e42ccca112

  • SHA1

    85156d4347decd70b060f7f90aea67fc7ca7bde8

  • SHA256

    38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33

  • SHA512

    874f04dfad6149d0635c84bf3e6c51caf74a7d5ae7ac62477d6760cfa19dfe8571c2da6e1b149e7f837407cc5e905b4767015e0608d3554ef2a9e05bb87ca083

  • SSDEEP

    49152:9YREXSVMDi34QnsHyjtk2MYC5GDsVN/wEwqq8u5zn:S2SVMD8dnsmtk2alWqTuxn

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • ParallaxRat payload 25 IoCs

    Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe
    "C:\Users\Admin\AppData\Local\Temp\38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\look2.exe
      C:\Users\Admin\AppData\Local\Temp\\look2.exe
      2⤵
      • Sets DLL path for service in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      PID:1700
    • C:\Users\Admin\AppData\Local\Temp\HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe
      C:\Users\Admin\AppData\Local\Temp\HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\ProgramData\Synaptics\Synaptics.exe
        "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2584
      • C:\Users\Admin\AppData\Local\Temp\._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2700
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "svchcst"
    1⤵
      PID:2840
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "svchcst"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Windows\SysWOW64\svchcst.exe
        C:\Windows\system32\svchcst.exe "c:\windows\system32\259395779.bat",MainThread
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1640
    • C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe"
      1⤵
        PID:2144
      • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
        1⤵
        • Enumerates system info in registry
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:540
      • C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        1⤵
          PID:2476
        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
          1⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2948
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
          1⤵
          • Drops startup file
          PID:1880

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe

                Filesize

                92KB

                MD5

                4174755650da6cf0921ef9218c11ebd7

                SHA1

                5de91f032c5357f0c570469fc64b015970da72c8

                SHA256

                97a3fd03eb743e47dd688c452749aacbd9606c058bcd9f5d61d93a29d5a9acd3

                SHA512

                1af854d7d2064476f8b4a5de02404e3b99bab6fa421ededbd2fe11fc59c5003ef091c0d7fdee1b6a382f304311bab55a614bab5eb576d14245180cf6856d1361

              • C:\Users\Admin\AppData\Local\Temp\HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe

                Filesize

                678KB

                MD5

                47c9fafe7a473c8b7289d1b40e1a5403

                SHA1

                751cd578b10180ef4e7bf34d1d68ebaf5e80a1c7

                SHA256

                bf54ddc771f78c0b114f58a3cffc2fbaa86629964631451854cddd238582c751

                SHA512

                bf5a1ea8b765cc684766ab1b5acd8f11b8818e043b4e5dff34ee798d4c1eba68b3d521c8b0b0423f8078d328a785ccba1db8b516cf4c8e82ba28a598959260b7

              • C:\Users\Admin\AppData\Local\Temp\HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe

                Filesize

                98KB

                MD5

                a341fd72bcbfb8193299710ab892f7fc

                SHA1

                8f17a5e05e03fdccef627d7087ce54e006903a95

                SHA256

                ca63f23295b0ea785a406fe4c2cba200823b860e9fa35e518bef0e82440b9679

                SHA512

                144f644a746230e62f9d79f416e683fbf5306ceb9728aaea85d19c025d857a893078b7fb0a9766517168a3e21532296776954dc43ca950d4849404716fcf78b8

              • C:\Users\Admin\AppData\Local\Temp\HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe

                Filesize

                1.1MB

                MD5

                e96cf578d5afe615b8d90b59aafd2631

                SHA1

                4b1367561ce5602d92572c9099e73ed344ce6076

                SHA256

                a06d95ee00fac4716600db5be785fe7f2059b14e9d00e571c78ea9f64c1b1be4

                SHA512

                18941c1d8f2890f0171baeaf57300e4910888696fb27a3097c4d5ff1fe974d4c7e323a7026dc000359eec9f1b5841ff52f274dea05f56e551384402802054be2

              • C:\Users\Admin\AppData\Local\Temp\HD_X.dat

                Filesize

                92KB

                MD5

                07b1ce545b7c5d9114717d643a6fae6e

                SHA1

                4c47d982fa87478754c1ea6733c5a1b62cd6d698

                SHA256

                e88dd28d7731349f4ef74f5413bd7ec0990f3b48aefcd56b70368d53eadbc3a4

                SHA512

                3ff2e738bf3c5348f4d6f4d29628e65f57b44926fbe68de82a88118b0b3b7d209dcb817f1f52c7c3e6764f334a63bd489c1d615a6f09f784a8a4b53bbfec2839

              • \Users\Admin\AppData\Local\Temp\._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe

                Filesize

                894KB

                MD5

                1f0f44135d50afb231c2c5ed5938f659

                SHA1

                79f6f29f8d31f8cf647e6c8b8b0803f75d95fd80

                SHA256

                987391c9ee6b7ace09697308212cc331b3ba419d86ea91c8cecdab0496a91b1f

                SHA512

                320e864495be9e550990dc21e3ea7c7d50e94a96ea3cdf5a512561d6b61dfbb3ee22f607d23ec3f8ea5ad433eb3f692a8e20b74681f22d7275ce5f67c048ec01

              • \Users\Admin\AppData\Local\Temp\._cache_HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe

                Filesize

                381KB

                MD5

                172ad4330f354a946837c90d0a4e56b2

                SHA1

                d79f808f72e9403aea8880e95ecbbee5ad555cd7

                SHA256

                296789f4ee01c92f8e4a6547d190385f699faa518ebd949a09b3eb215ad90810

                SHA512

                312b7a163bbe8322bb98a88ecea40fa784863c491b79deb6a4da494af6ee1056d809e3f367736b756498cc597e8c6017776c327f00f10fa7dc1a51843ff7445d

              • \Users\Admin\AppData\Local\Temp\HD_38300f4225fbfe1a971e0118640fe123e1a03e529c65a0f93a94425a8ad56c33.exe

                Filesize

                1024KB

                MD5

                6ca8163f84901d6f0ac29572891a7d3f

                SHA1

                417a658e7e831341e5b5edd9f3670bd6107efc86

                SHA256

                e77944626926d4f79871c5ff08153f3c74e2c953ec1fb9ac4cf09c0ee9ee6c17

                SHA512

                67b4029de78879ee1d309b026f71ec1c3b297e2d6550b3681685edd4c4a062aa9983ca5a6490b056c5b5b10d04f4d961e9cb188f7a97c361c22f8554649ab492

              • \Users\Admin\AppData\Local\Temp\look2.exe

                Filesize

                337KB

                MD5

                2f3b6f16e33e28ad75f3fdaef2567807

                SHA1

                85e907340faf1edfc9210db85a04abd43d21b741

                SHA256

                86492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857

                SHA512

                db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4

              • \Windows\SysWOW64\259395779.bat

                Filesize

                51KB

                MD5

                77ee8b76fe6eef8886d07761a5bd5684

                SHA1

                730a38753eb9e63d7744638d91888f034908e8cb

                SHA256

                3e3eef887a53eade7e5c10d4487c3588f4befcfec41ef1d59748469d3de2884b

                SHA512

                743b8f1c746b2877053aff00996b1f6ccb336e7c4cc1cfc627ba901af02e5c5f0d897d0a9e51a1529bc0d5fd026cb3f04c9ed9f116b04a85996ac433622c2e00

              • memory/540-181-0x0000000071DED000-0x0000000071DF8000-memory.dmp

                Filesize

                44KB

              • memory/540-137-0x0000000071DED000-0x0000000071DF8000-memory.dmp

                Filesize

                44KB

              • memory/540-136-0x000000005FFF0000-0x0000000060000000-memory.dmp

                Filesize

                64KB

              • memory/2144-133-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-118-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-180-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-120-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-121-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-122-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-124-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-125-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-126-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-127-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-128-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-130-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-131-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-132-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-106-0x0000000076F8F000-0x0000000076F90000-memory.dmp

                Filesize

                4KB

              • memory/2144-134-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-135-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-129-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-92-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-86-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-123-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-98-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-116-0x0000000000080000-0x0000000000081000-memory.dmp

                Filesize

                4KB

              • memory/2144-105-0x0000000000090000-0x0000000000091000-memory.dmp

                Filesize

                4KB

              • memory/2144-96-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/2144-90-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-88-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2144-84-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2376-66-0x0000000000400000-0x000000000064A000-memory.dmp

                Filesize

                2.3MB

              • memory/2376-22-0x0000000000380000-0x0000000000381000-memory.dmp

                Filesize

                4KB

              • memory/2476-170-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2476-183-0x0000000000400000-0x000000000042C000-memory.dmp

                Filesize

                176KB

              • memory/2476-171-0x0000000000418000-0x000000000042A000-memory.dmp

                Filesize

                72KB

              • memory/2584-179-0x0000000000400000-0x000000000064A000-memory.dmp

                Filesize

                2.3MB

              • memory/2584-67-0x00000000001B0000-0x00000000001B1000-memory.dmp

                Filesize

                4KB

              • memory/2584-178-0x00000000001B0000-0x00000000001B1000-memory.dmp

                Filesize

                4KB

              • memory/2584-213-0x0000000000400000-0x000000000064A000-memory.dmp

                Filesize

                2.3MB

              • memory/2700-56-0x0000000000280000-0x0000000000300000-memory.dmp

                Filesize

                512KB

              • memory/2700-119-0x0000000000280000-0x0000000000300000-memory.dmp

                Filesize

                512KB

              • memory/2700-60-0x0000000076F8F000-0x0000000076F90000-memory.dmp

                Filesize

                4KB

              • memory/2948-80-0x0000000000150000-0x00000000001D0000-memory.dmp

                Filesize

                512KB

              • memory/2948-169-0x0000000000150000-0x00000000001D0000-memory.dmp

                Filesize

                512KB