Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 02:44

General

  • Target

    b64fc47abc6b54d83e8bf471574a56ed.dll

  • Size

    138KB

  • MD5

    b64fc47abc6b54d83e8bf471574a56ed

  • SHA1

    c1b5991b8683fff43de3e08762a1af643db63977

  • SHA256

    e666c4a8156cfaeae629746714e32d22a77669fd1ea0d37fc2220ce168bca41a

  • SHA512

    5f7349517be3b53f38236fcde2f08c7e14d566e6c53116bfd1406ded66d98040c5d9584306f12029d0e2a3d6ebf31b1d45f5230bd29a08b6b82ecec7b1abc24e

  • SSDEEP

    3072:CwZSQpKa3VGVnpUlCz764/9xpEEBqbZuwl5iGHTqovq:JJVGpxx9b3wZuwl4GHTqo

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b64fc47abc6b54d83e8bf471574a56ed.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b64fc47abc6b54d83e8bf471574a56ed.dll,#1
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3224
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k imgsvc
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    PID:4600

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\program files (x86)\cwhg\mwqudkwyj.bmp

          Filesize

          16.5MB

          MD5

          353382d565bf9c576b61e2f0d5811f75

          SHA1

          fd3a95c413fc4f76da7ee8d95d008ec6256e5049

          SHA256

          6d0ac1331360d785394301c39951b694f27d39f194b0b1442847993348b40e05

          SHA512

          9453b9811fd3ce53d015e554956a394307f520fdf1e4326e49dedb4418a38ecfd16d51c1871a9cbbf6e2def3850e1d9a4fb3724b798ada6af51492f0118991df