Analysis

  • max time kernel
    142s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 13:19

General

  • Target

    e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d.exe

  • Size

    2.3MB

  • MD5

    5bd70186899c032e2f05fe9894c02698

  • SHA1

    5a3a792a406f7a75c58e1b72fe24acffb8b088bd

  • SHA256

    e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d

  • SHA512

    1049c54a7c2ccd36bef6cee5853da8e931889fbe045b0a189e6d13090df8b443ed228f3abe9ba4dc8338eee3a97fd6b6e2a5267e35f9a90a8b35cf109c0ea790

  • SSDEEP

    49152:x1vKR2L2PzCOXeiBFuKqFt9yW3Dv5lju+AVJ366N5zr9pgNrZgX8IwQk0:v8TeEFuKqFtcWTRljuZj9pigX8If

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • UAC bypass 3 TTPs 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d.exe
    "C:\Users\Admin\AppData\Local\Temp\e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Programdata\7zxvcc.exe
      C:\Programdata\7zxvcc.exe
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2344
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c unzip.bat
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Programdata\7z.exe
          7z.exe sign /f cache.dat /p aa123123 /d 61110001 /v "glib.dll"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:2848
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Programdata\2.vbe"
          4⤵
            PID:2628
    • C:\Windows\system32\mmc.exe
      C:\Windows\system32\mmc.exe -Embedding
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\ProgramData\svchost.exe
        "C:\ProgramData\svchost.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\ProgramData\svchost.exe
          C:\ProgramData\svchost.exe
          3⤵
          • Executes dropped EXE
          PID:1768
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 60
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:1304

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Privilege Escalation

    Abuse Elevation Control Mechanism

    1
    T1548

    Bypass User Account Control

    1
    T1548.002

    Defense Evasion

    Abuse Elevation Control Mechanism

    1
    T1548

    Bypass User Account Control

    1
    T1548.002

    Impair Defenses

    1
    T1562

    Disable or Modify Tools

    1
    T1562.001

    Modify Registry

    3
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    System Information Discovery

    3
    T1082

    Query Registry

    1
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\TASLoginBase.dll
      Filesize

      103KB

      MD5

      990cc3a1ae459170e0286b7472879ae8

      SHA1

      c7338a4ded118cf4ca2cda98a793afd856c2323e

      SHA256

      c48de908959a78ba70ecbf9793a6a37e7bba99615d7c15f4ec0102f1e04b2bb3

      SHA512

      f9143ed3548088e633c25507fdc9801e47bd7909e5300af71e5419ea9ef8538ffe8742e28aa96b203025069e9313e8aeb5cbc01062bb7d49a60afd31f0913d45

    • C:\ProgramData\Tencent.lnk
      Filesize

      897B

      MD5

      7ad1be0d3c8e0cba7f7d848aa49d7b23

      SHA1

      c62c42b497f08f951a623bd38eb828b6b552f672

      SHA256

      b5896994693d527b666248cd011581e2f54ce0b174ad7979319406d9a514988c

      SHA512

      a2040e23ce93698479cb9bc67f793f00922d3c6748cb3e15659b667d7346d6c9943e4faddf9d540c5ef58414a5986a45e282ae83cadca50243220965f0617e64

    • C:\ProgramData\cache.dat
      Filesize

      7KB

      MD5

      2dee19fb2b899134c3532687db5f9d3f

      SHA1

      f78098140f7de8158fdb683c31ab9b50b1b88454

      SHA256

      ae25561400fed84253d688af90e27670d12e1a9454f83f084d4137789eb0cbd0

      SHA512

      6d0adf805d152b4e0dc38f848383457e8185fc42d0a704fdf2b8a89ec96306843169ba96355b93f697ef0e3144ef13278226e4310d25b3e5463d144abd4ed8a8

    • C:\ProgramData\svchost.exe
      Filesize

      411KB

      MD5

      66557b2bd93e70a2804e983b279ab473

      SHA1

      4e58505689fd9643b5011880ce94b22cbfadf917

      SHA256

      a63c9e3f7256e38224f7256307d954d4a6baa9f023f6ac49d8cface7b2658e31

      SHA512

      b08d8b2872f4ebdbab7b15bd96f5d185f05030983c2d704497d30fe5f610874b5ec362f0e3e55800031edcd29b812d9b58214e76012a85df074310f36e0f33f4

    • C:\ProgramData\unzip.bat
      Filesize

      229B

      MD5

      20fd99cc3bc7eb0ad9d421895fedc22b

      SHA1

      68b7782f08a29f3e7351f37122ae99220a062224

      SHA256

      fe6bc55e16ec1a889d344c9f09d8fce455cf26374f61df1086bdeb14d9d2a9bd

      SHA512

      bc8828e39a5886b91352db967eab2dcc99dc4c2610f49019710959d0dd741acc2c1e82c8b4f840be9f1037b26c0b542cb397caaeca2a855a43a79a40d348ed1e

    • C:\ProgramData\update.log
      Filesize

      462KB

      MD5

      36569f853d22511c06e013d3ea86979a

      SHA1

      40feb35f2ec315a269c41f55f2c3c36a4f15d674

      SHA256

      2f6a402c99acddf48110bce3df6a0c67277efbd0fa2bcdc71b8a7b73ba4f53e8

      SHA512

      94ac069f292d1a97f76e182387f1865b26831d626108e54477c5096d5d1f98b2806b38cc71deafdae779d046516e6775ad99f56608b17ba3539fd1352704a9c4

    • C:\Programdata\2.vbe
      Filesize

      170B

      MD5

      e354f56e782e7db68f958e2d8d4d1b96

      SHA1

      69d51ed0e772cdcb9435d2566871c9bc80d77dfd

      SHA256

      ec8a6021a9e01ccaa823231d593e78b13f512811fb83563bb8cdb444d2b0f55b

      SHA512

      95e2cc8332b0375702bdac36d09509857ab0ec8b8cd7dda537324961db1ed5b58981e2ac0f9b611612e71e0b201cb4846adcf63e1c832f888eccbd59e76287c2

    • C:\Programdata\glib.dll
      Filesize

      103KB

      MD5

      e1b24eca469ef69ff000d6e8cdcc420c

      SHA1

      b6ad626ecf620e6a496743215ad530837d90fd9d

      SHA256

      a13f7fddbcdfc95f784dadbb4a2d4c7bd95a6e67c96c0a06bc7617443cfc2c2d

      SHA512

      c2987f0f63d0a8c93b028ae54da6af1c99f62aba100d63ab17fb3fa9601faad01f0ca1761d605ff3f95e50d88c63fff7c22f9b39bdaad6611fa181ffc15b1145

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      fbdf6981c8aec16deb3a8303019aeff0

      SHA1

      5c7543aba2fdea2f06381f402c944f86ab31d99d

      SHA256

      a46d627516db0cf3c1b254b24e6e75e87f53b630a5e5c306d294e3ea8c3eb0da

      SHA512

      69d52d38ea1606cd582b43de658cbffcc7c7a74d916f55c134b6c2cf2989cc348ed95ac3bfcfbbe5b37c3ca5dfa4daae7c6c097cab86712ab852284308aabcb6

    • C:\Users\Admin\AppData\Local\Temp\Tar2543.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \ProgramData\7z.exe
      Filesize

      221KB

      MD5

      d4e274097855a46146d39e8401c13103

      SHA1

      c620c2f14ae43ebe358d0d7b69da4469279d236a

      SHA256

      34d192505952e5a11ec69ffc4a963764125996edba9eed26ec5662cf7948f8e8

      SHA512

      3f8b3e288a87be8024fa1beb3e5e96cff75fa6b52cfeb6d3b21b3ae32d3242bb89da7adb25602ee3130bae971b8ec25c84378c4d77b03171de699457d37fd834

    • \ProgramData\7zxvcc.exe
      Filesize

      2.3MB

      MD5

      5bd70186899c032e2f05fe9894c02698

      SHA1

      5a3a792a406f7a75c58e1b72fe24acffb8b088bd

      SHA256

      e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d

      SHA512

      1049c54a7c2ccd36bef6cee5853da8e931889fbe045b0a189e6d13090df8b443ed228f3abe9ba4dc8338eee3a97fd6b6e2a5267e35f9a90a8b35cf109c0ea790

    • memory/1768-17619-0x0000000000400000-0x000000000051F000-memory.dmp
      Filesize

      1.1MB

    • memory/1768-17592-0x0000000000400000-0x000000000051F000-memory.dmp
      Filesize

      1.1MB

    • memory/1768-17589-0x0000000000400000-0x000000000051F000-memory.dmp
      Filesize

      1.1MB

    • memory/2108-17572-0x0000000001D40000-0x0000000001D41000-memory.dmp
      Filesize

      4KB

    • memory/2344-17581-0x0000000000400000-0x00000000006A7000-memory.dmp
      Filesize

      2.7MB

    • memory/2344-17400-0x0000000050000000-0x0000000050109000-memory.dmp
      Filesize

      1.0MB

    • memory/2344-17399-0x0000000000400000-0x00000000006A7000-memory.dmp
      Filesize

      2.7MB

    • memory/2344-17390-0x0000000002440000-0x0000000002551000-memory.dmp
      Filesize

      1.1MB

    • memory/2344-11251-0x0000000002190000-0x0000000002311000-memory.dmp
      Filesize

      1.5MB

    • memory/2344-8702-0x0000000000400000-0x00000000006A7000-memory.dmp
      Filesize

      2.7MB

    • memory/2524-17606-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/2524-17577-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/2772-840-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-856-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-860-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-864-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-862-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-866-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-868-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-870-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-872-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-2547-0x00000000021D0000-0x0000000002351000-memory.dmp
      Filesize

      1.5MB

    • memory/2772-8686-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-8694-0x0000000000400000-0x00000000006A7000-memory.dmp
      Filesize

      2.7MB

    • memory/2772-8696-0x0000000050000000-0x0000000050109000-memory.dmp
      Filesize

      1.0MB

    • memory/2772-834-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-8701-0x0000000003090000-0x0000000003337000-memory.dmp
      Filesize

      2.7MB

    • memory/2772-842-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-9471-0x0000000000400000-0x00000000006A7000-memory.dmp
      Filesize

      2.7MB

    • memory/2772-844-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-848-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-858-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-850-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-854-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-852-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-846-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-0-0x0000000000400000-0x00000000006A7000-memory.dmp
      Filesize

      2.7MB

    • memory/2772-836-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-838-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-828-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-830-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-832-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-822-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-824-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-826-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-818-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-820-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-811-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-814-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-816-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-812-0x0000000002480000-0x0000000002591000-memory.dmp
      Filesize

      1.1MB

    • memory/2772-1-0x00000000759B0000-0x00000000759F7000-memory.dmp
      Filesize

      284KB