Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 21:08

General

  • Target

    2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe

  • Size

    7.8MB

  • MD5

    21881bd9939d7d09d3aaa549c14a2d08

  • SHA1

    9ef8a14cb149b66c7b216b3ff0539d7e940aea27

  • SHA256

    dcd7a485b2320a10c962d04ebc906948083f56f6296fd9806f945287636d0913

  • SHA512

    55d5803c112a72a8e89aaade1f6f81f62a1e3e18e215861fdf01aac80636c4648907c14b88751569ac88e0a4718a19deaedcae4d730377ffe5bdd20fa89acf9d

  • SSDEEP

    98304:G2SVMD8CoUF89ce+MgNW0Jqm9c29ky52/VhHqa3igtS4o1J8DvQxxE:Gcxcce+vNjJN9c29R5WVoaj44ooD4xxE

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\look2.exe
      C:\Users\Admin\AppData\Local\Temp\\look2.exe
      2⤵
      • Sets DLL path for service in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      PID:2280
    • C:\Users\Admin\AppData\Local\Temp\HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe
      C:\Users\Admin\AppData\Local\Temp\HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2572
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "svchcst"
    1⤵
      PID:2564
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "svchcst"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Windows\SysWOW64\svchcst.exe
        C:\Windows\system32\svchcst.exe "c:\windows\system32\259401925.bat",MainThread
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\HD_X.dat

      Filesize

      1.2MB

      MD5

      559961b918d703e412b6dc026a2ad04f

      SHA1

      087591775070c2947bbd0428f4db97fd07897fb1

      SHA256

      f8cd9fb689fc87389dadfe1253e732362742950d80380f2888cfb1013f4b908f

      SHA512

      4f0661c14fb58a30d52adcc2a5d6699ff1faed9dd336587617b1e04751a48f883485a4ef82b587b8c894225e01345020b004ed8bc7d33f15ef127dd9017eb286

    • C:\Windows\SysWOW64\svchcst.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • \Users\Admin\AppData\Local\Temp\HD_2024052421881bd9939d7d09d3aaa549c14a2d08icedid.exe

      Filesize

      6.6MB

      MD5

      25f201c6e8f6ab9b790f372059859ab8

      SHA1

      c29b61ca2b8136746727b8090a1e544b3b1b1e36

      SHA256

      f9d32c17af33e16ab220fb2fada62638624f0c495b10bff02db4496b0c4b1572

      SHA512

      0bd3b937dc3b15c596d470235b220f28edde2d6e2963e3310e3be710a331eaf8b93741ca94aed18e57b7ece397645764c94f8e35e3bdc912eb9647f19e198c72

    • \Users\Admin\AppData\Local\Temp\look2.exe

      Filesize

      337KB

      MD5

      2f3b6f16e33e28ad75f3fdaef2567807

      SHA1

      85e907340faf1edfc9210db85a04abd43d21b741

      SHA256

      86492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857

      SHA512

      db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4

    • \Windows\SysWOW64\259401925.bat

      Filesize

      51KB

      MD5

      b7b3c43064f9b7570100bcf91fe32243

      SHA1

      1ddac5c74d5f11ef655ad4b3657cced0476bceea

      SHA256

      0ef9083ede4c183bbf7fca296b7854f539532e65b1e6daf85a735e4389d7f86b

      SHA512

      ac659a07a6f93ba5af6d881baacece31b1585a39858a371c50961c8eb9b4ef492ce87cf9dc78d0c7081792e915fec8ebb884d04fe16d3e94c2693a7af78ebdbd

    • memory/2572-20-0x0000000004360000-0x0000000004396000-memory.dmp

      Filesize

      216KB

    • memory/2572-46-0x0000000000400000-0x0000000000618000-memory.dmp

      Filesize

      2.1MB

    • memory/2572-49-0x0000000000400000-0x0000000000618000-memory.dmp

      Filesize

      2.1MB

    • memory/2572-51-0x0000000000400000-0x0000000000618000-memory.dmp

      Filesize

      2.1MB