Resubmissions

02-01-2025 21:33

250102-1ejbvswpcv 10

08-12-2024 01:12

241208-bkq68azkep 10

Analysis

  • max time kernel
    130s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2025 21:33

General

  • Target

    bjyk.exe

  • Size

    378KB

  • MD5

    a770ebf2e59e29c7460a01241a0a493f

  • SHA1

    97e59e483e1fa524a305828157a50203e918ada9

  • SHA256

    ca89debe5dff34c2e2f56875d7dcde5e47565329d3aeb2f2f4a6a3e2248fe664

  • SHA512

    4cf99a862fc6e2299e33113bb757dd31a0543c5b5716146de2051fbabe86a122e895a8ced9d4f2290ae82dd9f6093dc883abcb2a6747caa90e8fd46e061f6140

  • SSDEEP

    6144:WsItKnWUQpBTyPRqyhYPbncTBlhHrbndnkv0oX90wRudOl1YTSgux1p2iPtGZ5da:btWUzJq8YPbncT3+bRHfYTSgS21NPE+S

Malware Config

Signatures

  • Gh0st RAT payload 9 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bjyk.exe
    "C:\Users\Admin\AppData\Local\Temp\bjyk.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:772
    • \??\c:\users\admin\appdata\local\cpojoigwyp
      "C:\Users\Admin\AppData\Local\Temp\bjyk.exe" a -sc:\users\admin\appdata\local\temp\bjyk.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2184
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\programdata\drm\%sessionname%\etpgb.cc3

    Filesize

    22.1MB

    MD5

    ab0be390c4b7e856709f1cb01a4cc550

    SHA1

    0654822187561472d9f5301f54df3ba5f0bf872d

    SHA256

    5a5eb07e382d58cb95f91205dc9d8d5640e53802874ee41ae39028a463bf4d13

    SHA512

    d33f327f6c365bfc33d865aa2aa848af069123c2cc91fea0d608104002c0bb0dcf3816b46597efa90c3c251feb6c1f0e20b76e37a21c9129bff9b5d87b5d37a1

  • \Users\Admin\AppData\Local\Temp\srlB3B5.tmp

    Filesize

    172KB

    MD5

    4f407b29d53e9eb54e22d096fce82aa7

    SHA1

    a4ee25b066cac19ff679dd491f5791652bb71185

    SHA256

    cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc

    SHA512

    325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183

  • \Users\Admin\AppData\Local\cpojoigwyp

    Filesize

    23.7MB

    MD5

    c3d8463fb9d05321ec1b445b2b8ccb59

    SHA1

    c84ee6bc8c29503f06108a029950e6d6459b930f

    SHA256

    06ddd46d1dddfe35126879dda047cd2b101527533e96bff94f855fc0481dceb9

    SHA512

    9f5af992b45ede7b65e6dd626c996b2725efc220b5674cdec6c225fc075ee632132abf10e77cf4be9e861410aff3118bc27d74e88f12077f269f7eb4253996b5

  • memory/772-12-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/772-19-0x0000000000890000-0x0000000000904000-memory.dmp

    Filesize

    464KB

  • memory/772-7-0x0000000000890000-0x0000000000904000-memory.dmp

    Filesize

    464KB

  • memory/772-8-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/772-3-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/772-0-0x0000000000400000-0x0000000000432800-memory.dmp

    Filesize

    202KB

  • memory/772-4-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/772-1-0x0000000000280000-0x00000000002B3000-memory.dmp

    Filesize

    204KB

  • memory/772-18-0x0000000000400000-0x0000000000432800-memory.dmp

    Filesize

    202KB

  • memory/2184-23-0x0000000001E00000-0x0000000001E74000-memory.dmp

    Filesize

    464KB

  • memory/2184-25-0x0000000000400000-0x0000000000432800-memory.dmp

    Filesize

    202KB

  • memory/2184-16-0x0000000000400000-0x0000000000432800-memory.dmp

    Filesize

    202KB

  • memory/2184-32-0x0000000000400000-0x0000000000432800-memory.dmp

    Filesize

    202KB

  • memory/2184-31-0x0000000001E00000-0x0000000001E74000-memory.dmp

    Filesize

    464KB

  • memory/2764-33-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB