Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2024 13:19

General

  • Target

    e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d.exe

  • Size

    2.3MB

  • MD5

    5bd70186899c032e2f05fe9894c02698

  • SHA1

    5a3a792a406f7a75c58e1b72fe24acffb8b088bd

  • SHA256

    e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d

  • SHA512

    1049c54a7c2ccd36bef6cee5853da8e931889fbe045b0a189e6d13090df8b443ed228f3abe9ba4dc8338eee3a97fd6b6e2a5267e35f9a90a8b35cf109c0ea790

  • SSDEEP

    49152:x1vKR2L2PzCOXeiBFuKqFt9yW3Dv5lju+AVJ366N5zr9pgNrZgX8IwQk0:v8TeEFuKqFtcWTRljuZj9pigX8If

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • UAC bypass 3 TTPs 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d.exe
    "C:\Users\Admin\AppData\Local\Temp\e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Programdata\7zxvcc.exe
      C:\Programdata\7zxvcc.exe
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4268
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c unzip.bat
        3⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Programdata\7z.exe
          7z.exe sign /f cache.dat /p aa123123 /d 58170001 /v "glib.dll"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:3204
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Programdata\2.vbe"
          4⤵
            PID:1400
    • C:\Windows\system32\mmc.exe
      C:\Windows\system32\mmc.exe -Embedding
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\ProgramData\svchost.exe
        "C:\ProgramData\svchost.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4432
        • C:\ProgramData\svchost.exe
          C:\ProgramData\svchost.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1244
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 252
          3⤵
          • Program crash
          PID:2796
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 4432 -ip 4432
      1⤵
        PID:3576

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Privilege Escalation

      Abuse Elevation Control Mechanism

      1
      T1548

      Bypass User Account Control

      1
      T1548.002

      Defense Evasion

      Abuse Elevation Control Mechanism

      1
      T1548

      Bypass User Account Control

      1
      T1548.002

      Impair Defenses

      1
      T1562

      Disable or Modify Tools

      1
      T1562.001

      Modify Registry

      3
      T1112

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      4
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\7z.exe
        Filesize

        221KB

        MD5

        d4e274097855a46146d39e8401c13103

        SHA1

        c620c2f14ae43ebe358d0d7b69da4469279d236a

        SHA256

        34d192505952e5a11ec69ffc4a963764125996edba9eed26ec5662cf7948f8e8

        SHA512

        3f8b3e288a87be8024fa1beb3e5e96cff75fa6b52cfeb6d3b21b3ae32d3242bb89da7adb25602ee3130bae971b8ec25c84378c4d77b03171de699457d37fd834

      • C:\ProgramData\7zxvcc.exe
        Filesize

        2.3MB

        MD5

        5bd70186899c032e2f05fe9894c02698

        SHA1

        5a3a792a406f7a75c58e1b72fe24acffb8b088bd

        SHA256

        e8b47dc9b7ef12f900b0bd04b47af64527a12fda9e08dfa67ae6c39b55d9f02d

        SHA512

        1049c54a7c2ccd36bef6cee5853da8e931889fbe045b0a189e6d13090df8b443ed228f3abe9ba4dc8338eee3a97fd6b6e2a5267e35f9a90a8b35cf109c0ea790

      • C:\ProgramData\TASLoginBase.dll
        Filesize

        103KB

        MD5

        89fcdf644d461351714a1aff90f7dff6

        SHA1

        67edb564e48647032e9eec0896adac26da7258e5

        SHA256

        14a9e7038a42bb7ced0b52b7ff6cb6dbe9f0a6bf601d5ed7749332944b06d174

        SHA512

        6b973d8a200b5fbd848b51e099d26f3046200d22d10c5705c5ba6d4d8d1361193f105dbf9f8fe57475f24860db2da6739da4b1d51b8e589e822c341e48d08e67

      • C:\ProgramData\Tencent.lnk
        Filesize

        897B

        MD5

        7ad1be0d3c8e0cba7f7d848aa49d7b23

        SHA1

        c62c42b497f08f951a623bd38eb828b6b552f672

        SHA256

        b5896994693d527b666248cd011581e2f54ce0b174ad7979319406d9a514988c

        SHA512

        a2040e23ce93698479cb9bc67f793f00922d3c6748cb3e15659b667d7346d6c9943e4faddf9d540c5ef58414a5986a45e282ae83cadca50243220965f0617e64

      • C:\ProgramData\cache.dat
        Filesize

        7KB

        MD5

        2dee19fb2b899134c3532687db5f9d3f

        SHA1

        f78098140f7de8158fdb683c31ab9b50b1b88454

        SHA256

        ae25561400fed84253d688af90e27670d12e1a9454f83f084d4137789eb0cbd0

        SHA512

        6d0adf805d152b4e0dc38f848383457e8185fc42d0a704fdf2b8a89ec96306843169ba96355b93f697ef0e3144ef13278226e4310d25b3e5463d144abd4ed8a8

      • C:\ProgramData\svchost.exe
        Filesize

        411KB

        MD5

        66557b2bd93e70a2804e983b279ab473

        SHA1

        4e58505689fd9643b5011880ce94b22cbfadf917

        SHA256

        a63c9e3f7256e38224f7256307d954d4a6baa9f023f6ac49d8cface7b2658e31

        SHA512

        b08d8b2872f4ebdbab7b15bd96f5d185f05030983c2d704497d30fe5f610874b5ec362f0e3e55800031edcd29b812d9b58214e76012a85df074310f36e0f33f4

      • C:\ProgramData\update.log
        Filesize

        462KB

        MD5

        36569f853d22511c06e013d3ea86979a

        SHA1

        40feb35f2ec315a269c41f55f2c3c36a4f15d674

        SHA256

        2f6a402c99acddf48110bce3df6a0c67277efbd0fa2bcdc71b8a7b73ba4f53e8

        SHA512

        94ac069f292d1a97f76e182387f1865b26831d626108e54477c5096d5d1f98b2806b38cc71deafdae779d046516e6775ad99f56608b17ba3539fd1352704a9c4

      • C:\Programdata\2.vbe
        Filesize

        170B

        MD5

        e354f56e782e7db68f958e2d8d4d1b96

        SHA1

        69d51ed0e772cdcb9435d2566871c9bc80d77dfd

        SHA256

        ec8a6021a9e01ccaa823231d593e78b13f512811fb83563bb8cdb444d2b0f55b

        SHA512

        95e2cc8332b0375702bdac36d09509857ab0ec8b8cd7dda537324961db1ed5b58981e2ac0f9b611612e71e0b201cb4846adcf63e1c832f888eccbd59e76287c2

      • C:\Programdata\glib.dll
        Filesize

        103KB

        MD5

        e1b24eca469ef69ff000d6e8cdcc420c

        SHA1

        b6ad626ecf620e6a496743215ad530837d90fd9d

        SHA256

        a13f7fddbcdfc95f784dadbb4a2d4c7bd95a6e67c96c0a06bc7617443cfc2c2d

        SHA512

        c2987f0f63d0a8c93b028ae54da6af1c99f62aba100d63ab17fb3fa9601faad01f0ca1761d605ff3f95e50d88c63fff7c22f9b39bdaad6611fa181ffc15b1145

      • C:\Programdata\unzip.bat
        Filesize

        229B

        MD5

        20fd99cc3bc7eb0ad9d421895fedc22b

        SHA1

        68b7782f08a29f3e7351f37122ae99220a062224

        SHA256

        fe6bc55e16ec1a889d344c9f09d8fce455cf26374f61df1086bdeb14d9d2a9bd

        SHA512

        bc8828e39a5886b91352db967eab2dcc99dc4c2610f49019710959d0dd741acc2c1e82c8b4f840be9f1037b26c0b542cb397caaeca2a855a43a79a40d348ed1e

      • memory/1244-26203-0x0000000000400000-0x000000000051F000-memory.dmp
        Filesize

        1.1MB

      • memory/1244-26206-0x0000000000400000-0x000000000051F000-memory.dmp
        Filesize

        1.1MB

      • memory/1244-26207-0x0000000000400000-0x000000000051F000-memory.dmp
        Filesize

        1.1MB

      • memory/1244-26208-0x0000000000400000-0x000000000051F000-memory.dmp
        Filesize

        1.1MB

      • memory/1244-26210-0x0000000010000000-0x000000001017D000-memory.dmp
        Filesize

        1.5MB

      • memory/1244-26226-0x0000000000400000-0x000000000051F000-memory.dmp
        Filesize

        1.1MB

      • memory/4268-26155-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/4268-13081-0x0000000076A60000-0x0000000076C75000-memory.dmp
        Filesize

        2.1MB

      • memory/4268-26152-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/4268-26153-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/4268-26202-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/4268-26156-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/4268-26157-0x0000000050000000-0x0000000050109000-memory.dmp
        Filesize

        1.0MB

      • memory/4268-26150-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/4268-18965-0x0000000075350000-0x00000000753CA000-memory.dmp
        Filesize

        488KB

      • memory/4268-16956-0x00000000760D0000-0x0000000076270000-memory.dmp
        Filesize

        1.6MB

      • memory/4268-26151-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/4432-26201-0x0000000000400000-0x0000000000490000-memory.dmp
        Filesize

        576KB

      • memory/5108-0-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/5108-13075-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/5108-13074-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/5108-13072-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/5108-13077-0x0000000050000000-0x0000000050109000-memory.dmp
        Filesize

        1.0MB

      • memory/5108-15716-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/5108-13071-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/5108-13070-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/5108-13069-0x0000000000400000-0x00000000006A7000-memory.dmp
        Filesize

        2.7MB

      • memory/5108-5884-0x0000000075350000-0x00000000753CA000-memory.dmp
        Filesize

        488KB

      • memory/5108-3875-0x00000000760D0000-0x0000000076270000-memory.dmp
        Filesize

        1.6MB

      • memory/5108-1-0x0000000076A60000-0x0000000076C75000-memory.dmp
        Filesize

        2.1MB