Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2024 07:11

General

  • Target

    176e1919d26835b5477b3be9c53633debe0158a73fc7e05dbd74c81feb4ebacaN.exe

  • Size

    7.1MB

  • MD5

    2dcf9184a6873daf1b18b996b0ccd8a0

  • SHA1

    9f53b9789feb11ef17629bc27bef805be1078fb8

  • SHA256

    176e1919d26835b5477b3be9c53633debe0158a73fc7e05dbd74c81feb4ebaca

  • SHA512

    9b0762234a3bb69535ff78a33b831283a5caec3ed184d5df56276677ecffa8514bcf4fbe426fbdf4dcfaf0455906650063156fa3d771c448df4effbb91b13438

  • SSDEEP

    3072:gm06THCyt5mbCx6b41trGYTBfdpfZiJfLqye9aq:gm06TAb06gtrGYTBlpfcdqye9aq

Malware Config

Extracted

Family

latentbot

C2

jinyuan2013.zapto.org

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • LatentBot

    Modular trojan written in Delphi which has been in-the-wild since 2013.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\176e1919d26835b5477b3be9c53633debe0158a73fc7e05dbd74c81feb4ebacaN.exe
    "C:\Users\Admin\AppData\Local\Temp\176e1919d26835b5477b3be9c53633debe0158a73fc7e05dbd74c81feb4ebacaN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Users\Admin\AppData\Roaming\Help\iexplore.exe
      "C:\Users\Admin\AppData\Roaming\Help\iexplore.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IEBKBKARDT.TMP

    Filesize

    10.1MB

    MD5

    dfeb6c2564bde3cb075264122b327927

    SHA1

    9fc526bfa484545ce17c1150fe87a283c9d5db6d

    SHA256

    6c76b792453007f577df967054d8955f17325e1c24a66a92cecb1f764f4abd92

    SHA512

    411a87887558a07135ca49cce06bf4fba85b5d999a40244a08d6d1c7b052180dcdf688e3984ea608244e32ff1fd5bbdaf73cd124e3778b02a48bd0d176ee15d0

  • C:\Users\Admin\AppData\Local\Temp\win.ini

    Filesize

    116B

    MD5

    11086285b2c00388dff46b25485e69e5

    SHA1

    65c3148ab14b555c9a75e12857651230d9ecb71a

    SHA256

    5c91371b9324429e06562d9109ab2f425bbf54e542c269c205628662ecf74449

    SHA512

    682ce1d678fa24212d554be0a4da03fbd82b6326a6ca9821abea1b891b18b119a334aa11b9ade7b9728379a40833505a3163e621796c818abb14081065486f91

  • C:\Users\Admin\AppData\Roaming\Help\iexplore.exe

    Filesize

    37.1MB

    MD5

    4ae9fa3f00f6b84b2ed9bff1bfcf837a

    SHA1

    3a8afac653f4e92c5b503140e1ef6f51678f0a38

    SHA256

    0f3dda8a38c161b51e6b5d31f1d41cbda8b453a60d30d33d9119afaf0b83e5d4

    SHA512

    fa03420befd407ff5b3f373f0934cd78cd779fd2ad73a63d0aee4c8da643b66b946fab5d65eae064753bab651c88f3fe73df6689f16bfda3316a6c8daa19c1b3

  • memory/4504-22-0x0000000002250000-0x0000000002264000-memory.dmp

    Filesize

    80KB

  • memory/4504-24-0x0000000002250000-0x0000000002264000-memory.dmp

    Filesize

    80KB

  • memory/4504-19-0x0000000002250000-0x0000000002264000-memory.dmp

    Filesize

    80KB

  • memory/4504-28-0x0000000002250000-0x0000000002264000-memory.dmp

    Filesize

    80KB