Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 18:40

General

  • Target

    4132ab6ac46529121b2183a63f7e71c35bb2f733add6acaf2ee22491b8203ee7.exe

  • Size

    4.6MB

  • MD5

    3db635263ea4949c91667006a4b540f7

  • SHA1

    afe89e85c860ae2799cf1c656e4fb39150793dcb

  • SHA256

    4132ab6ac46529121b2183a63f7e71c35bb2f733add6acaf2ee22491b8203ee7

  • SHA512

    e9830aa861177b873820f3d81a439488b919caec4917ac489636dca54f54fd133f8db123fa7c0f776b41cdcead99b9dfac46b20688b104a0592d8b6acbc5255a

  • SSDEEP

    98304:G2SVMD8jdRyeKOljH/X7jqwxOJBAUZL2h:G9rjH/LjAJVE

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4132ab6ac46529121b2183a63f7e71c35bb2f733add6acaf2ee22491b8203ee7.exe
    "C:\Users\Admin\AppData\Local\Temp\4132ab6ac46529121b2183a63f7e71c35bb2f733add6acaf2ee22491b8203ee7.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\look2.exe
      C:\Users\Admin\AppData\Local\Temp\\look2.exe
      2⤵
      • Sets DLL path for service in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      PID:1952
    • C:\Users\Admin\AppData\Local\Temp\HD_4132ab6ac46529121b2183a63f7e71c35bb2f733add6acaf2ee22491b8203ee7.exe
      C:\Users\Admin\AppData\Local\Temp\HD_4132ab6ac46529121b2183a63f7e71c35bb2f733add6acaf2ee22491b8203ee7.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2584
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "svchcst"
    1⤵
      PID:2916
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "svchcst"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\SysWOW64\svchcst.exe
        C:\Windows\system32\svchcst.exe "c:\windows\system32\259397027.bat",MainThread
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\HD_X.dat
      Filesize

      1.2MB

      MD5

      96302b0a3475284cd1db513ab7162c49

      SHA1

      ad7f9f9f88460953efab56d09dcf25309dc8a8e7

      SHA256

      94b91a12bc4369f6d14d80eb55cb02b91ff5ebe771ce42eae56685af3e74c806

      SHA512

      dd9d6e07307407e0197cafba03ebb431c1429d14eac90ae21de724524f269abf2ed0887096ab3e88792fe27650ad3379e7b945244a2ebb6ed3bc657f1fa9ec17

    • \Users\Admin\AppData\Local\Temp\HD_4132ab6ac46529121b2183a63f7e71c35bb2f733add6acaf2ee22491b8203ee7.exe
      Filesize

      3.4MB

      MD5

      ddae04f779ceb3a90a2ea147aefb49b5

      SHA1

      af8104ecc68bdd3fd962b0d9404bf04cc2cf07ec

      SHA256

      c18a9d82f6b7830065a8663b4cfa11dfe4d09fc4775370ddbfbd8f175c790e86

      SHA512

      18c4bc9ffd7fb4ad39eafcd71e51fd11db0c11253069152b21249c8bd4c8078e3119677ca01e4cad9dc6b4fc2f57eaaf67736fe329420763c2fc3509a0bf8dab

    • \Users\Admin\AppData\Local\Temp\look2.exe
      Filesize

      337KB

      MD5

      2f3b6f16e33e28ad75f3fdaef2567807

      SHA1

      85e907340faf1edfc9210db85a04abd43d21b741

      SHA256

      86492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857

      SHA512

      db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4

    • \Windows\SysWOW64\259397027.bat
      Filesize

      51KB

      MD5

      e8ecfaad8a8a0853b22ad6e2d0787caa

      SHA1

      aa3aca316f95e660af898e9a5815b95396f660fa

      SHA256

      91967f9d2bc4fe8f3b1f0892a7354362319408f7f9a2a4cbcfcf9419edbc6db1

      SHA512

      db7c5b6178a78d01fbe48ad01d5974b4313f730743500c37f363b210638b71a0df95752b3f663b1166f42728c40f5fc94de5baf53b756350e009695d525dcb41

    • \Windows\SysWOW64\svchcst.exe
      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • memory/2584-22-0x0000000010000000-0x00000000101BC000-memory.dmp
      Filesize

      1.7MB