Resubmissions

02-01-2025 21:33

250102-1ejbvswpcv 10

08-12-2024 01:12

241208-bkq68azkep 10

Analysis

  • max time kernel
    144s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2025 21:33

General

  • Target

    dhl.exe

  • Size

    378KB

  • MD5

    a770ebf2e59e29c7460a01241a0a493f

  • SHA1

    97e59e483e1fa524a305828157a50203e918ada9

  • SHA256

    ca89debe5dff34c2e2f56875d7dcde5e47565329d3aeb2f2f4a6a3e2248fe664

  • SHA512

    4cf99a862fc6e2299e33113bb757dd31a0543c5b5716146de2051fbabe86a122e895a8ced9d4f2290ae82dd9f6093dc883abcb2a6747caa90e8fd46e061f6140

  • SSDEEP

    6144:WsItKnWUQpBTyPRqyhYPbncTBlhHrbndnkv0oX90wRudOl1YTSgux1p2iPtGZ5da:btWUzJq8YPbncT3+bRHfYTSgS21NPE+S

Malware Config

Signatures

  • Gh0st RAT payload 9 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dhl.exe
    "C:\Users\Admin\AppData\Local\Temp\dhl.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2996
    • \??\c:\users\admin\appdata\local\ipjcvjpqbi
      "C:\Users\Admin\AppData\Local\Temp\dhl.exe" a -sc:\users\admin\appdata\local\temp\dhl.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1368
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\programdata\drm\%sessionname%\revim.cc3

    Filesize

    19.0MB

    MD5

    2fc38025e5834155b20a2d8af4ed6d93

    SHA1

    e79b3b49632862eee0f3a64be6b5f7137c44077b

    SHA256

    9516511c8c29041a6d91910adcd1472cd315d0994436f5cd43702a0d643713f7

    SHA512

    1b7e8a43a4440e4b78ee9959b4017b1f5758109a40b44eaef1282a86dc66f1183e1c0fcda77e9b0602199e301585dbb2fa814636b96ccd718b36b1f6cdb84aab

  • \Users\Admin\AppData\Local\Temp\rulC8AC.tmp

    Filesize

    172KB

    MD5

    4f407b29d53e9eb54e22d096fce82aa7

    SHA1

    a4ee25b066cac19ff679dd491f5791652bb71185

    SHA256

    cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc

    SHA512

    325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183

  • \Users\Admin\AppData\Local\ipjcvjpqbi

    Filesize

    24.4MB

    MD5

    f15ff30cbd372b1593221274456a2aa5

    SHA1

    41e4ab2adf864bf49f2d95ab13490ef2cd443b7e

    SHA256

    cb98ff5789902a0d917eaf9d45d3f4ff6d8a0ef85661263f158d4419c722ae13

    SHA512

    64cd379b8f9cc315e42e215df472e31fcc0a19a413d17b16388dd8bea5bc6f2d5b32ba72db5bfc87a245251bfc4ad3dde512136f72ba2cbec575cf7da3d78082

  • memory/1368-25-0x0000000000400000-0x0000000000432800-memory.dmp

    Filesize

    202KB

  • memory/1368-24-0x0000000000330000-0x00000000003A4000-memory.dmp

    Filesize

    464KB

  • memory/1368-30-0x0000000000330000-0x00000000003A4000-memory.dmp

    Filesize

    464KB

  • memory/1368-31-0x0000000000400000-0x0000000000432800-memory.dmp

    Filesize

    202KB

  • memory/1368-16-0x0000000000400000-0x0000000000432800-memory.dmp

    Filesize

    202KB

  • memory/2760-33-0x0000000020000000-0x0000000020027000-memory.dmp

    Filesize

    156KB

  • memory/2760-32-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2996-3-0x0000000000230000-0x0000000000263000-memory.dmp

    Filesize

    204KB

  • memory/2996-18-0x0000000000400000-0x0000000000432800-memory.dmp

    Filesize

    202KB

  • memory/2996-0-0x0000000000400000-0x0000000000432800-memory.dmp

    Filesize

    202KB

  • memory/2996-19-0x0000000000350000-0x00000000003C4000-memory.dmp

    Filesize

    464KB

  • memory/2996-1-0x0000000000230000-0x0000000000263000-memory.dmp

    Filesize

    204KB

  • memory/2996-12-0x0000000000750000-0x0000000000783000-memory.dmp

    Filesize

    204KB

  • memory/2996-2-0x0000000000230000-0x0000000000263000-memory.dmp

    Filesize

    204KB

  • memory/2996-8-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/2996-7-0x0000000000350000-0x00000000003C4000-memory.dmp

    Filesize

    464KB