Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 10:44

General

  • Target

    397524a02ed516104fc739373215619294125281c49fe47f1dab68811b4cb871.exe

  • Size

    2.8MB

  • MD5

    ea1d39b5b1668b213adc1f96c5a89330

  • SHA1

    75691fee5bde2a44317d453a5c49f58806d5752d

  • SHA256

    397524a02ed516104fc739373215619294125281c49fe47f1dab68811b4cb871

  • SHA512

    881a2341c1bfdac9061984c686f58862939a5c434db38999acae23aa88250ed3ce8feb7dcb3ccfb1ca78fa00f34e89361383f1cbfa6f15a17736520032b7e3b1

  • SSDEEP

    49152:JYREXSVMDi3GhOtB7eU5DHMp7iruyJHVoBU/K2xG2aQktN8:22SVMD8PBaU5rnJ6U/KTH78

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 10 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\397524a02ed516104fc739373215619294125281c49fe47f1dab68811b4cb871.exe
    "C:\Users\Admin\AppData\Local\Temp\397524a02ed516104fc739373215619294125281c49fe47f1dab68811b4cb871.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\look2.exe
      C:\Users\Admin\AppData\Local\Temp\\look2.exe
      2⤵
      • Sets DLL path for service in the registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      PID:3008
    • C:\Users\Admin\AppData\Local\Temp\HD_397524a02ed516104fc739373215619294125281c49fe47f1dab68811b4cb871.exe
      C:\Users\Admin\AppData\Local\Temp\HD_397524a02ed516104fc739373215619294125281c49fe47f1dab68811b4cb871.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      PID:2284
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "svchcst"
    1⤵
      PID:2120
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "svchcst"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Windows\SysWOW64\svchcst.exe
        C:\Windows\system32\svchcst.exe "c:\windows\system32\259396684.bat",MainThread
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2376

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\HD_X.dat

            Filesize

            1.2MB

            MD5

            9ea235de82952d8b777b438f360db933

            SHA1

            3a687406b1beac7e55876f32b04f058b6ff0099c

            SHA256

            84fa5274a32b0cf9d8336294b57ae563dcaeb9eb350046facf40037e74aa9cdc

            SHA512

            ddb2b0bf71eaa7521e295b452edb8d7ff117d6da26c7346f51fa1cc80ba9443c9de90296c72981f2fce3bfff2357ab3e50af780b5ca8e4836852502d69b2f321

          • C:\Users\Admin\AppData\Local\Temp\look2.exe

            Filesize

            337KB

            MD5

            2f3b6f16e33e28ad75f3fdaef2567807

            SHA1

            85e907340faf1edfc9210db85a04abd43d21b741

            SHA256

            86492ebf2d6f471a5ee92977318d099b3ea86175b5b7ae522237ae01d07a4857

            SHA512

            db17e99e2df918cfc9ccbe934adfe73f0777ce1ce9f28b57a4b24ecd821efe2e0b976a634853247b77b16627d2bb3af4ba20306059d1d25ef38ffada7da3e3a4

          • \Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

            Filesize

            1.1MB

            MD5

            638e737b2293cf7b1f14c0b4fb1f3289

            SHA1

            f8e2223348433b992a8c42c4a7a9fb4b5c1158bc

            SHA256

            baad4798c3ab24dec8f0ac3cde48e2fee2e2dffa60d2b2497cd295cd6319fd5b

            SHA512

            4d714a0980238c49af10376ff26ec9e6415e7057925b32ec1c24780c3671047ac5b5670e46c1c6cf9f160519be8f37e1e57f05c30c6c4bda3b275b143aa0bf12

          • \Users\Admin\AppData\Local\Temp\E_N4\shell.fne

            Filesize

            40KB

            MD5

            d54753e7fc3ea03aec0181447969c0e8

            SHA1

            824e7007b6569ae36f174c146ae1b7242f98f734

            SHA256

            192608ff371400c1529aa05f1adba0fe4fdd769fcbf35ee5f8b4f78a838a7ec9

            SHA512

            c25ed4cb38d5d5e95a267979f0f3f9398c04a1bf5822dceb03d6f6d9b4832dfb227f1e6868327e52a0303f45c36b9ba806e75b16bd7419a7c5203c2ecbae838f

          • \Users\Admin\AppData\Local\Temp\HD_397524a02ed516104fc739373215619294125281c49fe47f1dab68811b4cb871.exe

            Filesize

            1.6MB

            MD5

            7afcef755cbfd8d9705a79c5762b82e8

            SHA1

            1b5b4543e3fd2fb486c3ac8f84177baf0ed0a773

            SHA256

            69bd6e8c1668ab77cc294a77b8d9b972029c32d3e11857fccdfc87b6d3f20b95

            SHA512

            e6ce58fb477e488b99d50415c4fb477e067922a5dc33b8411bd53cc30c72cbc76fe74f7039562b6f8c4d76f668888fb9aa8fb0eaef0dcdb378b31c1307f3ee4c

          • \Windows\SysWOW64\259396684.bat

            Filesize

            51KB

            MD5

            d3f0ed398ada5cc94d65d3f933a5e750

            SHA1

            772b906ffa6b1d8438b87693d8a0cdf749463634

            SHA256

            065e3a54b051df84a72831655454aeff471c0db19c76d539e164b85a1a4b8753

            SHA512

            9de505f9cf7916035698eb104472f8a63149fa7d344feb8c5410a4d10d3d5f6a05450f1e54563894c4ee2257fd7bacc8a3b98b9e458d3648795fbfd53f30add9

          • \Windows\SysWOW64\SkinH_EL.dll

            Filesize

            688KB

            MD5

            bd42ef63fc0f79fdaaeca95d62a96bbb

            SHA1

            97ca8ccb0e6f7ffeb05dc441b2427feb0b634033

            SHA256

            573cf4e4dfa8fe51fc8b80b79cd626cb861260d26b6e4f627841e11b4dce2f48

            SHA512

            431b5487003add16865538de428bf518046ee97ab6423d88f92cda4ff263f971c0cf3827049465b9288a219cc32698fd687939c7c648870dd7d8d6776735c93c

          • \Windows\SysWOW64\svchcst.exe

            Filesize

            43KB

            MD5

            51138beea3e2c21ec44d0932c71762a8

            SHA1

            8939cf35447b22dd2c6e6f443446acc1bf986d58

            SHA256

            5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

            SHA512

            794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

          • memory/2284-30-0x0000000000220000-0x0000000000231000-memory.dmp

            Filesize

            68KB

          • memory/2284-35-0x0000000001F60000-0x000000000200F000-memory.dmp

            Filesize

            700KB

          • memory/2284-24-0x0000000000400000-0x000000000050F000-memory.dmp

            Filesize

            1.1MB

          • memory/2284-57-0x0000000000400000-0x000000000050F000-memory.dmp

            Filesize

            1.1MB

          • memory/2364-22-0x00000000029D0000-0x0000000002ADF000-memory.dmp

            Filesize

            1.1MB

          • memory/2364-56-0x00000000029D0000-0x0000000002ADF000-memory.dmp

            Filesize

            1.1MB