Overview
overview
10Static
static
10UDP.exe
windows11-21h2-x64
3a
windows11-21h2-x64
1arm1
windows11-21h2-x64
1bj.exe
windows11-21h2-x64
10bjyk.exe
windows11-21h2-x64
10cctv.exe
windows11-21h2-x64
10cctv_2.exe
windows11-21h2-x64
10cn.exe
windows11-21h2-x64
7cn1.exe
windows11-21h2-x64
3dhl.exe
windows11-21h2-x64
10java
windows11-21h2-x64
1java (2)
windows11-21h2-x64
1java1
windows11-21h2-x64
1k5.exe
windows11-21h2-x64
10ly1
windows11-21h2-x64
1mh.exe
windows11-21h2-x64
10mips
windows11-21h2-x64
1pjhxx
windows11-21h2-x64
1rootkit
windows11-21h2-x64
1se.exe
windows11-21h2-x64
7server.exe
windows11-21h2-x64
10smss.exe
windows11-21h2-x64
10sqlrer
windows11-21h2-x64
1squld
windows11-21h2-x64
1ssh.sh
windows11-21h2-x64
3taskmgr.exe
windows11-21h2-x64
10win.exe
windows11-21h2-x64
10wm.html
windows11-21h2-x64
4wrt1
windows11-21h2-x64
1xm.exe
windows11-21h2-x64
10yk.exe
windows11-21h2-x64
10yk1.exe
windows11-21h2-x64
10Analysis
-
max time kernel
432s -
max time network
1155s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-12-2024 18:43
Behavioral task
behavioral1
Sample
UDP.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
a
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
arm1
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
bj.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
bjyk.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
cctv.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
cctv_2.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
cn.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
cn1.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
dhl.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
java
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
java (2)
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
java1
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
k5.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
ly1
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
mh.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
mips
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
pjhxx
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
rootkit
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
se.exe
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
server.exe
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
smss.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
sqlrer
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
squld
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
ssh.sh
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
taskmgr.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
win.exe
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
wm.html
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
wrt1
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
xm.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
yk.exe
Resource
win11-20241007-en
General
-
Target
server.exe
-
Size
378KB
-
MD5
a770ebf2e59e29c7460a01241a0a493f
-
SHA1
97e59e483e1fa524a305828157a50203e918ada9
-
SHA256
ca89debe5dff34c2e2f56875d7dcde5e47565329d3aeb2f2f4a6a3e2248fe664
-
SHA512
4cf99a862fc6e2299e33113bb757dd31a0543c5b5716146de2051fbabe86a122e895a8ced9d4f2290ae82dd9f6093dc883abcb2a6747caa90e8fd46e061f6140
-
SSDEEP
6144:WsItKnWUQpBTyPRqyhYPbncTBlhHrbndnkv0oX90wRudOl1YTSgux1p2iPtGZ5da:btWUzJq8YPbncT3+bRHfYTSgS21NPE+S
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral21/memory/3388-0-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral21/files/0x001a00000002aabb-12.dat family_gh0strat behavioral21/memory/3476-15-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral21/memory/3476-25-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral21/memory/3388-17-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral21/files/0x001a00000002ab04-28.dat family_gh0strat behavioral21/memory/3476-31-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral21/memory/1252-34-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral21/memory/1884-39-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral21/memory/1828-44-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral21/files/0x001d00000002aa52-2.dat acprotect -
Deletes itself 1 IoCs
pid Process 3476 frddnqidbl -
Executes dropped EXE 1 IoCs
pid Process 3476 frddnqidbl -
Loads dropped DLL 7 IoCs
pid Process 3388 server.exe 3388 server.exe 3476 frddnqidbl 3476 frddnqidbl 1252 svchost.exe 1884 svchost.exe 1828 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\djjgtulhew svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\dswacxofrr svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\dbunmrjjrb svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3928 1252 WerFault.exe 78 3472 1884 WerFault.exe 82 3348 1828 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frddnqidbl Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3476 frddnqidbl 3476 frddnqidbl -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 3476 frddnqidbl Token: SeBackupPrivilege 3476 frddnqidbl Token: SeBackupPrivilege 3476 frddnqidbl Token: SeRestorePrivilege 3476 frddnqidbl Token: SeBackupPrivilege 1252 svchost.exe Token: SeRestorePrivilege 1252 svchost.exe Token: SeBackupPrivilege 1252 svchost.exe Token: SeBackupPrivilege 1252 svchost.exe Token: SeSecurityPrivilege 1252 svchost.exe Token: SeSecurityPrivilege 1252 svchost.exe Token: SeBackupPrivilege 1252 svchost.exe Token: SeBackupPrivilege 1252 svchost.exe Token: SeSecurityPrivilege 1252 svchost.exe Token: SeBackupPrivilege 1252 svchost.exe Token: SeBackupPrivilege 1252 svchost.exe Token: SeSecurityPrivilege 1252 svchost.exe Token: SeBackupPrivilege 1252 svchost.exe Token: SeRestorePrivilege 1252 svchost.exe Token: SeBackupPrivilege 1884 svchost.exe Token: SeRestorePrivilege 1884 svchost.exe Token: SeBackupPrivilege 1884 svchost.exe Token: SeBackupPrivilege 1884 svchost.exe Token: SeSecurityPrivilege 1884 svchost.exe Token: SeSecurityPrivilege 1884 svchost.exe Token: SeBackupPrivilege 1884 svchost.exe Token: SeBackupPrivilege 1884 svchost.exe Token: SeSecurityPrivilege 1884 svchost.exe Token: SeBackupPrivilege 1884 svchost.exe Token: SeBackupPrivilege 1884 svchost.exe Token: SeSecurityPrivilege 1884 svchost.exe Token: SeBackupPrivilege 1884 svchost.exe Token: SeRestorePrivilege 1884 svchost.exe Token: SeBackupPrivilege 1828 svchost.exe Token: SeRestorePrivilege 1828 svchost.exe Token: SeBackupPrivilege 1828 svchost.exe Token: SeBackupPrivilege 1828 svchost.exe Token: SeSecurityPrivilege 1828 svchost.exe Token: SeSecurityPrivilege 1828 svchost.exe Token: SeBackupPrivilege 1828 svchost.exe Token: SeBackupPrivilege 1828 svchost.exe Token: SeSecurityPrivilege 1828 svchost.exe Token: SeBackupPrivilege 1828 svchost.exe Token: SeBackupPrivilege 1828 svchost.exe Token: SeSecurityPrivilege 1828 svchost.exe Token: SeBackupPrivilege 1828 svchost.exe Token: SeRestorePrivilege 1828 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3388 server.exe 3476 frddnqidbl -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3388 wrote to memory of 3476 3388 server.exe 77 PID 3388 wrote to memory of 3476 3388 server.exe 77 PID 3388 wrote to memory of 3476 3388 server.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3388 -
\??\c:\users\admin\appdata\local\frddnqidbl"C:\Users\Admin\AppData\Local\Temp\server.exe" a -sc:\users\admin\appdata\local\temp\server.exe2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3476
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 11002⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1252 -ip 12521⤵PID:2308
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 11082⤵
- Program crash
PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1884 -ip 18841⤵PID:5000
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 11122⤵
- Program crash
PID:3348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1828 -ip 18281⤵PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD54f407b29d53e9eb54e22d096fce82aa7
SHA1a4ee25b066cac19ff679dd491f5791652bb71185
SHA256cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc
SHA512325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183
-
Filesize
22.1MB
MD52062a529abc59129add396f1ebb0989a
SHA1791da57ab89a38239dfe8e0541daecdd86fe8cd6
SHA256a49cceb58bcb389c7d0cc8f82f6786da626d4b643eb55fae5179462ea124718d
SHA5126846e2cd4ab52f3a0f1ce35d29c8c484878a1c753f85d7202023179232d3aa55c6f0b7f6c619e46afa3b1844e3ccfa4b0d4753ef20f6d7ee5c5704929cb607f7
-
Filesize
202B
MD589210fb1a54248dbf727b8daddee654f
SHA1aa48bb74ead4d55b4cb71e7f09ff4af818de612c
SHA2569578cffa98a69caef47fd6a9ac856d9b3e16892a322ecc18b030cc45d6f8b2ff
SHA512dcfb5c3cc91fac21d02ea41e822041a0abfb3c8697ccaed5dadc14cbbe69b652444fdbc5abe248c28cd6d3c1d811d22ea8823989cafa5fc467ca6b705d0c708d
-
Filesize
303B
MD572c121ad4fc5d889ee205b1d0634fd05
SHA19b35ea724f257d9e3d90ccdd53445a9247b574c8
SHA2567a0f63f60f741c1463e4bbd0d69f9234b3931e569225720f6c70d45d4c33d741
SHA512c5162329dcdd0304e4662651fb2ad176c379b5d2446e9aed3fa22a42af62fb40e1120c73e06bd74f05ec9af05ab3e5868e05787e11eeafe667a9b44db81dbab7
-
Filesize
24.1MB
MD5c3f06f5383899953a4b2e9818893ba1c
SHA10511329a38cd458d955aeaa5cf4c5371f56f8e3d
SHA256f14893eb1ee1fcec69a3b5e3af7eb83dbf8f576140cb06ec7e6adf14fa9ba62e
SHA51240ab9313029953fc5ba9fb1051f97ad55224a31413b5437f70b90b3122147df11ebffefbaabb0997a2c325f2f48efaf04e2b613dad3d6489679b6ede89a216b2