Analysis

  • max time kernel
    140s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2025, 22:32

General

  • Target

    43de2e460114511b95976b1497fd9e4aed988dc18613f21a6b35e33b348bc57d.exe

  • Size

    618KB

  • MD5

    12f9cf2345cb81a928c27c11d837959e

  • SHA1

    f6eb420ca7b062413e58dc5e87e4bfe5cacc2bbf

  • SHA256

    43de2e460114511b95976b1497fd9e4aed988dc18613f21a6b35e33b348bc57d

  • SHA512

    0560277f3760a4563ade7dffa5197978733ea0b0d79d9b79f5074424d21dd9b61c12c7942fffd9342c0dc940c5e67a8557b26ec7948b95b897d13591ac09fd91

  • SSDEEP

    12288:EVRTE3het1yJh2HduH7GqjTyiVRTE3het1yJh2HduH7GqjTy:IX1AwHsH7hTyOX1AwHsH7hTy

Malware Config

Extracted

Family

gh0strat

C2

98.126.162.38:3201

http://98.126.162.36:803/

http://98.126.162.37:805/index.php

Attributes
  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C))

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)

Signatures

  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43de2e460114511b95976b1497fd9e4aed988dc18613f21a6b35e33b348bc57d.exe
    "C:\Users\Admin\AppData\Local\Temp\43de2e460114511b95976b1497fd9e4aed988dc18613f21a6b35e33b348bc57d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\jmfgeg.exe "C:\Users\Admin\AppData\Local\Temp\43de2e460114511b95976b1497fd9e4aed988dc18613f21a6b35e33b348bc57d.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 2
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:3408
      • C:\Users\Admin\AppData\Local\Temp\jmfgeg.exe
        C:\Users\Admin\AppData\Local\Temp\\jmfgeg.exe "C:\Users\Admin\AppData\Local\Temp\43de2e460114511b95976b1497fd9e4aed988dc18613f21a6b35e33b348bc57d.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3172
        • \??\c:\Program Files\edily\vcrsshn.exe
          "c:\Program Files\edily\vcrsshn.exe" "c:\Program Files\edily\vcrsshn.dll",Scheduler C:\Users\Admin\AppData\Local\Temp\jmfgeg.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Enumerates connected drives
          • Writes to the Master Boot Record (MBR)
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\edily\vcrsshn.exe

    Filesize

    60KB

    MD5

    889b99c52a60dd49227c5e485a016679

    SHA1

    8fa889e456aa646a4d0a4349977430ce5fa5e2d7

    SHA256

    6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910

    SHA512

    08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641

  • C:\Users\Admin\AppData\Local\Temp\jmfgeg.exe

    Filesize

    618KB

    MD5

    9a3c40818a32a7e8a235cc5e773c1b2e

    SHA1

    78b98b9d7e5da58a3161f7e5d490764dc909f6e7

    SHA256

    75a917ec0a48af86189f5d757ea2f9f5afd9c54fc39fc2906670c307203e8ffd

    SHA512

    67dbf36451ccabca15c3e877b1216bf4b6e9be9132f1add42c3da2df3aa853ba7b558b55e701bc6531e726ab3dbb8aa9b7098b711b3d2ebddde0d0a9c2e82f3b

  • \??\c:\Program Files\edily\vcrsshn.dll

    Filesize

    184KB

    MD5

    2aca926cc85b780d31a1c05f7cd0123b

    SHA1

    535292472f445db25ded2da6cc38fe582f85e567

    SHA256

    a3a76d7cb92f178df998f5951a9b8e650161cad5cb590dee88c031ebae754c6d

    SHA512

    d6e68ab07adfbcfe1a0a4e31b759ae5d793cc0c3fdf3ae829f9e1c49be98bd5e129d03c9de1be2ed81cbbf3fdd715bb66fd81e716179ff3608de4b632f57c351

  • memory/1676-11-0x0000000010000000-0x0000000010074000-memory.dmp

    Filesize

    464KB

  • memory/1676-12-0x0000000010000000-0x0000000010074000-memory.dmp

    Filesize

    464KB

  • memory/1676-15-0x0000000010000000-0x0000000010074000-memory.dmp

    Filesize

    464KB