Overview
overview
10Static
static
10UDP.exe
windows11-21h2-x64
3a
windows11-21h2-x64
1arm1
windows11-21h2-x64
1bj.exe
windows11-21h2-x64
10bjyk.exe
windows11-21h2-x64
10cctv.exe
windows11-21h2-x64
10cctv_2.exe
windows11-21h2-x64
10cn.exe
windows11-21h2-x64
7cn1.exe
windows11-21h2-x64
3dhl.exe
windows11-21h2-x64
10java
windows11-21h2-x64
1java (2)
windows11-21h2-x64
1java1
windows11-21h2-x64
1k5.exe
windows11-21h2-x64
10ly1
windows11-21h2-x64
1mh.exe
windows11-21h2-x64
10mips
windows11-21h2-x64
1pjhxx
windows11-21h2-x64
1rootkit
windows11-21h2-x64
1se.exe
windows11-21h2-x64
7server.exe
windows11-21h2-x64
10smss.exe
windows11-21h2-x64
10sqlrer
windows11-21h2-x64
1squld
windows11-21h2-x64
1ssh.sh
windows11-21h2-x64
3taskmgr.exe
windows11-21h2-x64
10win.exe
windows11-21h2-x64
10wm.html
windows11-21h2-x64
4wrt1
windows11-21h2-x64
1xm.exe
windows11-21h2-x64
10yk.exe
windows11-21h2-x64
10yk1.exe
windows11-21h2-x64
10Analysis
-
max time kernel
439s -
max time network
1160s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-12-2024 18:43
Behavioral task
behavioral1
Sample
UDP.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
a
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
arm1
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
bj.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
bjyk.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
cctv.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
cctv_2.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
cn.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
cn1.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
dhl.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
java
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
java (2)
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
java1
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
k5.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
ly1
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
mh.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
mips
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
pjhxx
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
rootkit
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
se.exe
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
server.exe
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
smss.exe
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
sqlrer
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
squld
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
ssh.sh
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
taskmgr.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
win.exe
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
wm.html
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
wrt1
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
xm.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
yk.exe
Resource
win11-20241007-en
General
-
Target
yk.exe
-
Size
378KB
-
MD5
a770ebf2e59e29c7460a01241a0a493f
-
SHA1
97e59e483e1fa524a305828157a50203e918ada9
-
SHA256
ca89debe5dff34c2e2f56875d7dcde5e47565329d3aeb2f2f4a6a3e2248fe664
-
SHA512
4cf99a862fc6e2299e33113bb757dd31a0543c5b5716146de2051fbabe86a122e895a8ced9d4f2290ae82dd9f6093dc883abcb2a6747caa90e8fd46e061f6140
-
SSDEEP
6144:WsItKnWUQpBTyPRqyhYPbncTBlhHrbndnkv0oX90wRudOl1YTSgux1p2iPtGZ5da:btWUzJq8YPbncT3+bRHfYTSgS21NPE+S
Malware Config
Signatures
-
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral31/memory/5628-0-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral31/files/0x001900000002abd6-13.dat family_gh0strat behavioral31/memory/5752-14-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral31/memory/5628-16-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral31/memory/5752-24-0x0000000000760000-0x00000000007D4000-memory.dmp family_gh0strat behavioral31/memory/5752-27-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral31/files/0x001a00000002abd8-30.dat family_gh0strat behavioral31/memory/5752-33-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral31/memory/6000-36-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral31/memory/1972-41-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral31/memory/6020-46-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral31/files/0x001a00000002ab83-2.dat acprotect -
Deletes itself 1 IoCs
pid Process 5752 ostiusdoqs -
Executes dropped EXE 1 IoCs
pid Process 5752 ostiusdoqs -
Loads dropped DLL 7 IoCs
pid Process 5628 yk.exe 5628 yk.exe 5752 ostiusdoqs 5752 ostiusdoqs 6000 svchost.exe 1972 svchost.exe 6020 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\fsvynmtudl svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\fbkrvpvspg svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\fkhgfjqwpp svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4616 6000 WerFault.exe 79 2128 1972 WerFault.exe 83 4872 6020 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ostiusdoqs -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5752 ostiusdoqs 5752 ostiusdoqs -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 5752 ostiusdoqs Token: SeBackupPrivilege 5752 ostiusdoqs Token: SeBackupPrivilege 5752 ostiusdoqs Token: SeRestorePrivilege 5752 ostiusdoqs Token: SeBackupPrivilege 6000 svchost.exe Token: SeRestorePrivilege 6000 svchost.exe Token: SeBackupPrivilege 6000 svchost.exe Token: SeBackupPrivilege 6000 svchost.exe Token: SeSecurityPrivilege 6000 svchost.exe Token: SeSecurityPrivilege 6000 svchost.exe Token: SeBackupPrivilege 6000 svchost.exe Token: SeBackupPrivilege 6000 svchost.exe Token: SeSecurityPrivilege 6000 svchost.exe Token: SeBackupPrivilege 6000 svchost.exe Token: SeBackupPrivilege 6000 svchost.exe Token: SeSecurityPrivilege 6000 svchost.exe Token: SeBackupPrivilege 6000 svchost.exe Token: SeRestorePrivilege 6000 svchost.exe Token: SeBackupPrivilege 1972 svchost.exe Token: SeRestorePrivilege 1972 svchost.exe Token: SeBackupPrivilege 1972 svchost.exe Token: SeBackupPrivilege 1972 svchost.exe Token: SeSecurityPrivilege 1972 svchost.exe Token: SeSecurityPrivilege 1972 svchost.exe Token: SeBackupPrivilege 1972 svchost.exe Token: SeBackupPrivilege 1972 svchost.exe Token: SeSecurityPrivilege 1972 svchost.exe Token: SeBackupPrivilege 1972 svchost.exe Token: SeBackupPrivilege 1972 svchost.exe Token: SeSecurityPrivilege 1972 svchost.exe Token: SeBackupPrivilege 1972 svchost.exe Token: SeRestorePrivilege 1972 svchost.exe Token: SeBackupPrivilege 6020 svchost.exe Token: SeRestorePrivilege 6020 svchost.exe Token: SeBackupPrivilege 6020 svchost.exe Token: SeBackupPrivilege 6020 svchost.exe Token: SeSecurityPrivilege 6020 svchost.exe Token: SeSecurityPrivilege 6020 svchost.exe Token: SeBackupPrivilege 6020 svchost.exe Token: SeBackupPrivilege 6020 svchost.exe Token: SeSecurityPrivilege 6020 svchost.exe Token: SeBackupPrivilege 6020 svchost.exe Token: SeBackupPrivilege 6020 svchost.exe Token: SeSecurityPrivilege 6020 svchost.exe Token: SeBackupPrivilege 6020 svchost.exe Token: SeRestorePrivilege 6020 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5628 yk.exe 5752 ostiusdoqs -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5628 wrote to memory of 5752 5628 yk.exe 78 PID 5628 wrote to memory of 5752 5628 yk.exe 78 PID 5628 wrote to memory of 5752 5628 yk.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\yk.exe"C:\Users\Admin\AppData\Local\Temp\yk.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5628 -
\??\c:\users\admin\appdata\local\ostiusdoqs"C:\Users\Admin\AppData\Local\Temp\yk.exe" a -sc:\users\admin\appdata\local\temp\yk.exe2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5752
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6000 -s 11042⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 6000 -ip 60001⤵PID:3860
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 8842⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1972 -ip 19721⤵PID:1708
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6020 -s 8602⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 6020 -ip 60201⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD54f407b29d53e9eb54e22d096fce82aa7
SHA1a4ee25b066cac19ff679dd491f5791652bb71185
SHA256cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc
SHA512325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183
-
Filesize
22.4MB
MD5503f589f44c4feeaf8b59587dac73711
SHA1583012bfe244f5582e625ba3fb85c7043992c03c
SHA2561a1efbf1f49754a2350a797e81ba51c1579445eac5771fcde40c82281431f55d
SHA5126ba16a5ef96d612668854869395cf1095a218e4bb59edf28e1c98a2c003ab182fa4293059a1b471388a297d70e28f8210c2396da6e752df12804be98eeed6f9c
-
Filesize
202B
MD5b391319a7d810fa7dd9a7afce7903ad0
SHA1c043d5aed45796cee675490374849edff90c6632
SHA25686958c9009f43ed573027fd2d50b465459c0081a399ee7a712b835221af1079c
SHA512f1773a14d96418d0ae8772b38329e0063d5339714ee9b46beab969b310b491c91a6bcb4f701bfda27b85177e64c6361912bcd7ee361b1f7a35e3319d38691c4d
-
Filesize
303B
MD5a1d72c8f960d827f6e654d1b769de787
SHA16f7b4ac429f1a1f5713349e110ccf9ccad350839
SHA256fb2cdedaa01e73a7e8e2584923380695333fe973994cd0bc0d86a6d979dc0dd2
SHA512037e0070832d3684b7ebd53b64ba6ccfac6fa1ae8fb4af63e6cce217bf045e420f41904ffd831466258903b538543a7f1c34d2d91fbc0d7779e4a2f16fa63a88
-
Filesize
22.1MB
MD5dc7b954c0eb460183e4daac5fa8d3980
SHA19b99f89bfe3c3ff78ed872b80f2abb2970f889df
SHA25699bfab4b4d78d6f7da17662d533cb3cf11e6973ed4fe976bcbd02238558b206e
SHA51205bd723bcd2ee5ec9249c5647a103bdd9fb4860d57933003d2d7e815b7b0046a982cc5090bc7439309b60a762bda9a89bbd60ba2b01b7aa13ab79ea5c5b5f174