Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
b897b5a2c190a2229b451b7858aa42ed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b897b5a2c190a2229b451b7858aa42ed.exe
Resource
win10v2004-20240226-en
General
-
Target
b897b5a2c190a2229b451b7858aa42ed.exe
-
Size
264KB
-
MD5
b897b5a2c190a2229b451b7858aa42ed
-
SHA1
acc77091772c8ee5050131b666596520ee12a57b
-
SHA256
6700aafcd1e47c077d76bba6ec8bbc573a8da2aad10d473269839fc085de1b2c
-
SHA512
37592aed9b0abe216b15374f7591eaaf9fa5e3b61df7edcafd7b88a7744e408fbb9ebaab9276db485f716380ec6c50e9f92680749af114a8d1749aa76373accc
-
SSDEEP
6144:xhAgehnpVH0pwpM2EmMCqmeGsoozQ9b9O:7AgehnpVH0pp2yekf
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral1/files/0x000c00000001340b-20.dat family_gh0strat behavioral1/files/0x000c00000001340b-25.dat family_gh0strat behavioral1/files/0x000c00000001340b-23.dat family_gh0strat behavioral1/files/0x000c00000001340b-22.dat family_gh0strat behavioral1/files/0x000c00000001340b-21.dat family_gh0strat behavioral1/memory/2504-26-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/2504-27-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/2504-28-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/1220-29-0x0000000000400000-0x0000000000472000-memory.dmp family_gh0strat behavioral1/memory/1220-40-0x0000000000400000-0x0000000000472000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 2404 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2504 alibao.exe -
Loads dropped DLL 7 IoCs
pid Process 1220 b897b5a2c190a2229b451b7858aa42ed.exe 2504 alibao.exe 2504 alibao.exe 2504 alibao.exe 2504 alibao.exe 2504 alibao.exe 2504 alibao.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 alibao.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Common Files\alihao.bat b897b5a2c190a2229b451b7858aa42ed.exe File created C:\Program Files\Common Files\alibao.dll b897b5a2c190a2229b451b7858aa42ed.exe File created C:\Program Files\Common Files\alibao.bat b897b5a2c190a2229b451b7858aa42ed.exe File created C:\Program Files\Common Files\alibao.VBS b897b5a2c190a2229b451b7858aa42ed.exe File created C:\Program Files\Common Files\alibao.exe b897b5a2c190a2229b451b7858aa42ed.exe File opened for modification C:\Program Files\Common Files\alibao.exe b897b5a2c190a2229b451b7858aa42ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 alibao.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz alibao.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2504 alibao.exe 2504 alibao.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2504 1220 b897b5a2c190a2229b451b7858aa42ed.exe 28 PID 1220 wrote to memory of 2504 1220 b897b5a2c190a2229b451b7858aa42ed.exe 28 PID 1220 wrote to memory of 2504 1220 b897b5a2c190a2229b451b7858aa42ed.exe 28 PID 1220 wrote to memory of 2504 1220 b897b5a2c190a2229b451b7858aa42ed.exe 28 PID 1220 wrote to memory of 2504 1220 b897b5a2c190a2229b451b7858aa42ed.exe 28 PID 1220 wrote to memory of 2504 1220 b897b5a2c190a2229b451b7858aa42ed.exe 28 PID 1220 wrote to memory of 2504 1220 b897b5a2c190a2229b451b7858aa42ed.exe 28 PID 1220 wrote to memory of 2388 1220 b897b5a2c190a2229b451b7858aa42ed.exe 29 PID 1220 wrote to memory of 2388 1220 b897b5a2c190a2229b451b7858aa42ed.exe 29 PID 1220 wrote to memory of 2388 1220 b897b5a2c190a2229b451b7858aa42ed.exe 29 PID 1220 wrote to memory of 2388 1220 b897b5a2c190a2229b451b7858aa42ed.exe 29 PID 1220 wrote to memory of 2388 1220 b897b5a2c190a2229b451b7858aa42ed.exe 29 PID 1220 wrote to memory of 2388 1220 b897b5a2c190a2229b451b7858aa42ed.exe 29 PID 1220 wrote to memory of 2388 1220 b897b5a2c190a2229b451b7858aa42ed.exe 29 PID 1220 wrote to memory of 2404 1220 b897b5a2c190a2229b451b7858aa42ed.exe 30 PID 1220 wrote to memory of 2404 1220 b897b5a2c190a2229b451b7858aa42ed.exe 30 PID 1220 wrote to memory of 2404 1220 b897b5a2c190a2229b451b7858aa42ed.exe 30 PID 1220 wrote to memory of 2404 1220 b897b5a2c190a2229b451b7858aa42ed.exe 30 PID 1220 wrote to memory of 2404 1220 b897b5a2c190a2229b451b7858aa42ed.exe 30 PID 1220 wrote to memory of 2404 1220 b897b5a2c190a2229b451b7858aa42ed.exe 30 PID 1220 wrote to memory of 2404 1220 b897b5a2c190a2229b451b7858aa42ed.exe 30 PID 2388 wrote to memory of 1348 2388 cmd.exe 33 PID 2388 wrote to memory of 1348 2388 cmd.exe 33 PID 2388 wrote to memory of 1348 2388 cmd.exe 33 PID 2388 wrote to memory of 1348 2388 cmd.exe 33 PID 2388 wrote to memory of 1348 2388 cmd.exe 33 PID 2388 wrote to memory of 1348 2388 cmd.exe 33 PID 2388 wrote to memory of 1348 2388 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\b897b5a2c190a2229b451b7858aa42ed.exe"C:\Users\Admin\AppData\Local\Temp\b897b5a2c190a2229b451b7858aa42ed.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files\Common Files\alibao.exe"C:\Program Files\Common Files\alibao.exe" "C:\Program Files\Common Files\alibao.dll" ServiceMain2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\alihao.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files\Common Files\alibao.VBS"3⤵PID:1348
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\B897B5~1.EXE2⤵
- Deletes itself
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5116a7142bbe72653f8ea7c8a9a568c3b
SHA18149a7db5bd43bb51454e4ccb11a5a41ef6a7dde
SHA256e41de1869ca1f14c4bdafbfadd7a769184014ceead652aeba326659368e6c695
SHA5123e463fd656afe51c403afb002c43e27a5c3e3a52543691c648c3253b377ec2afa4bf237b29566341b350c0d4d0e4c90a092d779e7b557fb196888e7cf89abbc7
-
Filesize
20.9MB
MD59bbe8b241a0a98f0960931300c28a556
SHA128f45a207817761c819f0e52f33d6c6ff0694bcb
SHA25627a06ee9637df61a9f15b1c76f7e558e553b395f756161033f9b5cb7aa22092f
SHA5122e3003b89a814f359d375c55f89ddf4be0420e600aec164f708d79a1c096e5d975e8086aaeb2cee29fc765c43d1bbe7faa0d3b8d00d54c22c8a3d0cd96c9478d
-
Filesize
57B
MD51cdb9bcf58f9a3764fca74fb9f3fbfc3
SHA112bee8a9862242ed39d4316b11b4c568c778ba0b
SHA2564fbd276e36e32db6ef3ba7d86d57c56b870575d76adcdcd82829acd8a7ccc950
SHA5121bc9a5d46df7f91a7b36dd3050d034a43a67bf66cdf27b5f84ce5ed0542c5b51defabbd6c38408cc1e340b4fc26f652034ee19bd24d86d495d75e54a6497acc6
-
Filesize
11.3MB
MD57d7b5934f38a03c380dccdc71be01537
SHA1175a860eb609a3a577f5a8e65ed5ebd6ea1997c6
SHA256be0df19fc29fd637710f1396133730447a98fd3baeb8747d126c4455ab17f482
SHA512911eb8c7176c39d4b747d2d9fbcaab5ba7cc5b9cb19ea9471dc7e233fee25fef5a0726a94bc6700c0f65ab0c8a81a8421b6b2e310dd3943f74ec9e53f6d3ad85
-
Filesize
9.4MB
MD576109c252c61f35967958373566ddccd
SHA1a18daf06a658d7cf9b729e35fde580a3ea963f20
SHA25630b0309c8204a80056a1c62431fe9a997eab85ea863238d69e4cdc6ef0fb3079
SHA5126fe07c4e6a44492671361ee9220377bd152e89b1112c4a5f0b01eebe544b219f34dd24e66f2de62e82db30ec7d280019e2d0f05eff3dea6a829444624477da52
-
Filesize
8.8MB
MD5011733ed5abff6747c453cbc50c2781f
SHA13fc9d4e77cc9a2244e7bb61351736f97d2098080
SHA256e96b23aae29492f193006a1539e4fa6efc27009013968fe973975e5d2de7615f
SHA5122cad005c1595d1e284d110cd9b2f31029692c9613e9ea180964eec8140f6c9d83da6a60bdbea67433e5ca6dcb7ec004340c216eba62051753bf262c38fe952df
-
Filesize
7.1MB
MD5ffd429b5a9e5035b2ed8606976d46bc2
SHA191fe22dbd9ed171d01dc5bfa14d568befbd2f07f
SHA2568443107c66512ae269100e04b8272237fbac9325a2adbafb89bb84f7098a1401
SHA5127c4e3cf9bd20a5d3af2f3ecbe65150366825364f0eb4fbbd58ee3127a0d6732396976a9f52624e8dea41dd97d358611824a84cd52c658824bf39d5e201fd2cfe
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d