Overview
overview
10Static
static
10UDP.exe
windows11-21h2-x64
3a
windows11-21h2-x64
1arm1
windows11-21h2-x64
1bj.exe
windows11-21h2-x64
10bjyk.exe
windows11-21h2-x64
10cctv.exe
windows11-21h2-x64
10cctv_2.exe
windows11-21h2-x64
10cn.exe
windows11-21h2-x64
7cn1.exe
windows11-21h2-x64
3dhl.exe
windows11-21h2-x64
10java
windows11-21h2-x64
1java (2)
windows11-21h2-x64
1java1
windows11-21h2-x64
1k5.exe
windows11-21h2-x64
10ly1
windows11-21h2-x64
1mh.exe
windows11-21h2-x64
10mips
windows11-21h2-x64
1pjhxx
windows11-21h2-x64
1rootkit
windows11-21h2-x64
1se.exe
windows11-21h2-x64
7server.exe
windows11-21h2-x64
10smss.exe
windows11-21h2-x64
10sqlrer
windows11-21h2-x64
1squld
windows11-21h2-x64
1ssh.sh
windows11-21h2-x64
3taskmgr.exe
windows11-21h2-x64
10win.exe
windows11-21h2-x64
10wm.html
windows11-21h2-x64
4wrt1
windows11-21h2-x64
1xm.exe
windows11-21h2-x64
10yk.exe
windows11-21h2-x64
10yk1.exe
windows11-21h2-x64
10Analysis
-
max time kernel
430s -
max time network
1155s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-12-2024 18:43
Behavioral task
behavioral1
Sample
UDP.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
a
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
arm1
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
bj.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
bjyk.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
cctv.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
cctv_2.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
cn.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
cn1.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
dhl.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
java
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
java (2)
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
java1
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
k5.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
ly1
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
mh.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
mips
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
pjhxx
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
rootkit
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
se.exe
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
server.exe
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
smss.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
sqlrer
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
squld
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
ssh.sh
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
taskmgr.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
win.exe
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
wm.html
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
wrt1
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
xm.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
yk.exe
Resource
win11-20241007-en
General
-
Target
dhl.exe
-
Size
378KB
-
MD5
a770ebf2e59e29c7460a01241a0a493f
-
SHA1
97e59e483e1fa524a305828157a50203e918ada9
-
SHA256
ca89debe5dff34c2e2f56875d7dcde5e47565329d3aeb2f2f4a6a3e2248fe664
-
SHA512
4cf99a862fc6e2299e33113bb757dd31a0543c5b5716146de2051fbabe86a122e895a8ced9d4f2290ae82dd9f6093dc883abcb2a6747caa90e8fd46e061f6140
-
SSDEEP
6144:WsItKnWUQpBTyPRqyhYPbncTBlhHrbndnkv0oX90wRudOl1YTSgux1p2iPtGZ5da:btWUzJq8YPbncT3+bRHfYTSgS21NPE+S
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral10/memory/3560-0-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral10/files/0x001900000002ac06-12.dat family_gh0strat behavioral10/memory/844-25-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral10/memory/3560-22-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral10/memory/844-15-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral10/files/0x001a00000002ac0a-28.dat family_gh0strat behavioral10/memory/844-31-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral10/memory/4036-34-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral10/memory/3592-39-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral10/memory/1924-44-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral10/files/0x0009000000029ccd-4.dat acprotect -
Deletes itself 1 IoCs
pid Process 844 kmucwsrpnf -
Executes dropped EXE 1 IoCs
pid Process 844 kmucwsrpnf -
Loads dropped DLL 7 IoCs
pid Process 3560 dhl.exe 3560 dhl.exe 844 kmucwsrpnf 844 kmucwsrpnf 4036 svchost.exe 3592 svchost.exe 1924 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\ciqwsivbnl svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\cqeqblyxbh svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\cysjjobvnc svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3308 4036 WerFault.exe 78 1892 3592 WerFault.exe 82 672 1924 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kmucwsrpnf Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 844 kmucwsrpnf 844 kmucwsrpnf -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 844 kmucwsrpnf Token: SeBackupPrivilege 844 kmucwsrpnf Token: SeBackupPrivilege 844 kmucwsrpnf Token: SeRestorePrivilege 844 kmucwsrpnf Token: SeBackupPrivilege 4036 svchost.exe Token: SeRestorePrivilege 4036 svchost.exe Token: SeBackupPrivilege 4036 svchost.exe Token: SeBackupPrivilege 4036 svchost.exe Token: SeSecurityPrivilege 4036 svchost.exe Token: SeSecurityPrivilege 4036 svchost.exe Token: SeBackupPrivilege 4036 svchost.exe Token: SeBackupPrivilege 4036 svchost.exe Token: SeSecurityPrivilege 4036 svchost.exe Token: SeBackupPrivilege 4036 svchost.exe Token: SeBackupPrivilege 4036 svchost.exe Token: SeSecurityPrivilege 4036 svchost.exe Token: SeBackupPrivilege 4036 svchost.exe Token: SeRestorePrivilege 4036 svchost.exe Token: SeBackupPrivilege 3592 svchost.exe Token: SeRestorePrivilege 3592 svchost.exe Token: SeBackupPrivilege 3592 svchost.exe Token: SeBackupPrivilege 3592 svchost.exe Token: SeSecurityPrivilege 3592 svchost.exe Token: SeSecurityPrivilege 3592 svchost.exe Token: SeBackupPrivilege 3592 svchost.exe Token: SeBackupPrivilege 3592 svchost.exe Token: SeSecurityPrivilege 3592 svchost.exe Token: SeBackupPrivilege 3592 svchost.exe Token: SeBackupPrivilege 3592 svchost.exe Token: SeSecurityPrivilege 3592 svchost.exe Token: SeBackupPrivilege 3592 svchost.exe Token: SeRestorePrivilege 3592 svchost.exe Token: SeBackupPrivilege 1924 svchost.exe Token: SeRestorePrivilege 1924 svchost.exe Token: SeBackupPrivilege 1924 svchost.exe Token: SeBackupPrivilege 1924 svchost.exe Token: SeSecurityPrivilege 1924 svchost.exe Token: SeSecurityPrivilege 1924 svchost.exe Token: SeBackupPrivilege 1924 svchost.exe Token: SeBackupPrivilege 1924 svchost.exe Token: SeSecurityPrivilege 1924 svchost.exe Token: SeBackupPrivilege 1924 svchost.exe Token: SeBackupPrivilege 1924 svchost.exe Token: SeSecurityPrivilege 1924 svchost.exe Token: SeBackupPrivilege 1924 svchost.exe Token: SeRestorePrivilege 1924 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3560 dhl.exe 844 kmucwsrpnf -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3560 wrote to memory of 844 3560 dhl.exe 77 PID 3560 wrote to memory of 844 3560 dhl.exe 77 PID 3560 wrote to memory of 844 3560 dhl.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\dhl.exe"C:\Users\Admin\AppData\Local\Temp\dhl.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3560 -
\??\c:\users\admin\appdata\local\kmucwsrpnf"C:\Users\Admin\AppData\Local\Temp\dhl.exe" a -sc:\users\admin\appdata\local\temp\dhl.exe2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:844
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 8962⤵
- Program crash
PID:3308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4036 -ip 40361⤵PID:3536
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 7842⤵
- Program crash
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3592 -ip 35921⤵PID:1780
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 11082⤵
- Program crash
PID:672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1924 -ip 19241⤵PID:1272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD54f407b29d53e9eb54e22d096fce82aa7
SHA1a4ee25b066cac19ff679dd491f5791652bb71185
SHA256cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc
SHA512325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183
-
Filesize
19.6MB
MD5654661d5582d618322b34aff46730b68
SHA18f21e3972448ab2b35ac5de210b911524c3e65c2
SHA25621cc5d31d33788bd77b55ae4e72395c64e59d4ec0f2631ff5972cf114e9c76f1
SHA51253abe3f33c39e494ff048c3429ebda9f7b19e6167adddd8e811a578b624842edb89a8bdc49d12c84031a1a4a2bfc83c2894da4c4c07b27fc0e49a3f715d31c22
-
Filesize
200B
MD549cf2e0a63b92f851dafe17f54eb7245
SHA165551682c03a031d8d6eab4bf67aa7fe8fe73725
SHA256a02f48f8dad5bc2d1d0a7cd317ee0cd6e421486d4d0cd7d6e60e6061f9dedc24
SHA512efaa9d2e199e81c52da180e54ded59e2dd16969ed6bf9511575433c68da80895b461748e974e6d329d0a6c0ded479aac37ea03849803738832ad52691c412caf
-
Filesize
301B
MD539412ef53796475fa17df1d46ac1bc0b
SHA11dc46930635660e4f7c57fc5ac3b4f53724d1d6e
SHA256866255af95c6b1405f8dc1aebfdfc8dd625f015413d3e8a89b98b7fe464afadf
SHA5127a5ac56726bbb05cdac605a02a61421ba46c1bc75cfb721f308c85779de965f5a534aaafce35438c294b1c62dc1d3e87b35486a0fdaa72730458d48d73acf016
-
Filesize
23.0MB
MD521e59a86fbb9ce69b28ccfd9f4a7db4b
SHA1ded5c6fe3e1281b19fb53809f55b90d1b1bed2c8
SHA256824000f3e1c86a9385512bc5afe076ef1ddf16afa39e8a48eaabb741fbe0bc02
SHA5129a9dbdf0ec6d335a09b8c91c8a7df915e8b2a93dcc581d0937fe72f40da03bf6cfa3acf031b635ff0ea57dddaa6746620379d9655bc849284670fb150e939390