Overview
overview
10Static
static
10123.exe
windows10-2004-x64
32211/SkinH.dll
windows10-2004-x64
52211/updat...er.exe
windows10-2004-x64
3360sb.exe
windows10-2004-x64
107000.32
windows10-2004-x64
37000.64
windows10-2004-x64
3711/服务...r).exe
windows10-2004-x64
6BIN/Fallen.exe
windows10-2004-x64
3BIN/SkinH.dll
windows10-2004-x64
5BIN/主控端.exe
windows10-2004-x64
10BIN/生成器.exe
windows10-2004-x64
10Linux577
windows10-2004-x64
1Mh.exe
windows10-2004-x64
10Mh1.exe
windows10-2004-x64
10Mh2.exe
windows10-2004-x64
10SETUP.exe
windows10-2004-x64
TX98
windows10-2004-x64
1TX981
windows10-2004-x64
1TX982
windows10-2004-x64
1TX984
windows10-2004-x64
1TX985
windows10-2004-x64
1TX986
windows10-2004-x64
1bjyk.exe
windows10-2004-x64
10ceshi.exe
windows10-2004-x64
10ddos.exe
windows10-2004-x64
10dhl.exe
windows10-2004-x64
10mh3.exe
windows10-2004-x64
10server.exe
windows10-2004-x64
10smss.exe
windows10-2004-x64
xiaoqi.exe
windows10-2004-x64
10xiaose.exe
windows10-2004-x64
10yk.exe
windows10-2004-x64
10Analysis
-
max time kernel
462s -
max time network
435s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 06:40
Behavioral task
behavioral1
Sample
123.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
2211/SkinH.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
2211/update/server.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral4
Sample
360sb.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
7000.32
Resource
win10v2004-20250217-en
Behavioral task
behavioral6
Sample
7000.64
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
711/服务器(Server).exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral8
Sample
BIN/Fallen.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
BIN/SkinH.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
BIN/主控端.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
BIN/生成器.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral12
Sample
Linux577
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Mh.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral14
Sample
Mh1.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Mh2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral16
Sample
SETUP.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
TX98
Resource
win10v2004-20250217-en
Behavioral task
behavioral18
Sample
TX981
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
TX982
Resource
win10v2004-20250217-en
Behavioral task
behavioral20
Sample
TX984
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
TX985
Resource
win10v2004-20250217-en
Behavioral task
behavioral22
Sample
TX986
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
bjyk.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral24
Sample
ceshi.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
ddos.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral26
Sample
dhl.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
mh3.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral28
Sample
server.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
smss.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral30
Sample
xiaoqi.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
xiaose.exe
Resource
win10v2004-20250217-en
General
-
Target
bjyk.exe
-
Size
377KB
-
MD5
ca7c977b5b315dd62b0189f2619764db
-
SHA1
42ce52b22e5017990660148ba6c5ff0097c5af01
-
SHA256
c6d90ced12fb16ca9ae112787ce6d29379b06e0ba0a90595e337c07453a571fa
-
SHA512
b7be48e4c7ca12e0059a6b0064eaa8e8c1f4bbd7ed62c2a34671a5875ba25715b45b780d54e58f5429b2cade56244f6a820a46c0a45b0f7e9d4567213a499427
-
SSDEEP
6144:xsItKnWUQpBTyPRqyhYPbncTBlhHrbndnkv0oX90Q1vPjrVCTH3mwVaYo7/8FaA/:OtWUzJq8YPbncT3+vXPjc3xVaYo7UFyO
Malware Config
Signatures
-
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral23/memory/4924-0-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral23/files/0x000c000000023c7c-12.dat family_gh0strat behavioral23/memory/4236-13-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral23/memory/4924-17-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral23/memory/4236-25-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral23/files/0x000300000001e727-28.dat family_gh0strat behavioral23/memory/4236-32-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat behavioral23/memory/2288-35-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral23/memory/2900-40-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral23/memory/2908-45-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral23/files/0x000c000000023c1e-2.dat acprotect -
Deletes itself 1 IoCs
pid Process 4236 erpxyctmuh -
Executes dropped EXE 1 IoCs
pid Process 4236 erpxyctmuh -
Loads dropped DLL 7 IoCs
pid Process 4924 bjyk.exe 4924 bjyk.exe 4236 erpxyctmuh 4236 erpxyctmuh 2288 svchost.exe 2900 svchost.exe 2908 svchost.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\pumqicykoi svchost.exe File created C:\Windows\SysWOW64\pekervtpor svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\pekervtpor svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\pmxxaywmbm svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3208 2288 WerFault.exe 88 5068 2900 WerFault.exe 94 2056 2908 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjyk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erpxyctmuh Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4236 erpxyctmuh 4236 erpxyctmuh -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 4236 erpxyctmuh Token: SeBackupPrivilege 4236 erpxyctmuh Token: SeBackupPrivilege 4236 erpxyctmuh Token: SeRestorePrivilege 4236 erpxyctmuh Token: SeBackupPrivilege 2288 svchost.exe Token: SeRestorePrivilege 2288 svchost.exe Token: SeBackupPrivilege 2288 svchost.exe Token: SeBackupPrivilege 2288 svchost.exe Token: SeSecurityPrivilege 2288 svchost.exe Token: SeSecurityPrivilege 2288 svchost.exe Token: SeBackupPrivilege 2288 svchost.exe Token: SeBackupPrivilege 2288 svchost.exe Token: SeSecurityPrivilege 2288 svchost.exe Token: SeBackupPrivilege 2288 svchost.exe Token: SeBackupPrivilege 2288 svchost.exe Token: SeSecurityPrivilege 2288 svchost.exe Token: SeBackupPrivilege 2288 svchost.exe Token: SeRestorePrivilege 2288 svchost.exe Token: SeBackupPrivilege 2900 svchost.exe Token: SeRestorePrivilege 2900 svchost.exe Token: SeBackupPrivilege 2900 svchost.exe Token: SeBackupPrivilege 2900 svchost.exe Token: SeSecurityPrivilege 2900 svchost.exe Token: SeSecurityPrivilege 2900 svchost.exe Token: SeBackupPrivilege 2900 svchost.exe Token: SeBackupPrivilege 2900 svchost.exe Token: SeSecurityPrivilege 2900 svchost.exe Token: SeBackupPrivilege 2900 svchost.exe Token: SeBackupPrivilege 2900 svchost.exe Token: SeSecurityPrivilege 2900 svchost.exe Token: SeBackupPrivilege 2900 svchost.exe Token: SeRestorePrivilege 2900 svchost.exe Token: SeBackupPrivilege 2908 svchost.exe Token: SeRestorePrivilege 2908 svchost.exe Token: SeBackupPrivilege 2908 svchost.exe Token: SeBackupPrivilege 2908 svchost.exe Token: SeSecurityPrivilege 2908 svchost.exe Token: SeSecurityPrivilege 2908 svchost.exe Token: SeBackupPrivilege 2908 svchost.exe Token: SeBackupPrivilege 2908 svchost.exe Token: SeSecurityPrivilege 2908 svchost.exe Token: SeBackupPrivilege 2908 svchost.exe Token: SeBackupPrivilege 2908 svchost.exe Token: SeSecurityPrivilege 2908 svchost.exe Token: SeBackupPrivilege 2908 svchost.exe Token: SeRestorePrivilege 2908 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4924 bjyk.exe 4236 erpxyctmuh -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4924 wrote to memory of 4236 4924 bjyk.exe 87 PID 4924 wrote to memory of 4236 4924 bjyk.exe 87 PID 4924 wrote to memory of 4236 4924 bjyk.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\bjyk.exe"C:\Users\Admin\AppData\Local\Temp\bjyk.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
\??\c:\users\admin\appdata\local\erpxyctmuh"C:\Users\Admin\AppData\Local\Temp\bjyk.exe" a -sc:\users\admin\appdata\local\temp\bjyk.exe2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4236
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 8122⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2288 -ip 22881⤵PID:3300
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 9282⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2900 -ip 29001⤵PID:4788
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 9322⤵
- Program crash
PID:2056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2908 -ip 29081⤵PID:1720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
23.3MB
MD531d9df498c8030cfdad9d7cdc886e908
SHA1b17abad617fe09a44b50f0c28cd6b1d8e9e71042
SHA256a53c1f13ce41e3372ea8a58e976fd48a5b2628aed2366a03e0840662a3c3831c
SHA51272b87cc1f5fc84de5d7295ef7be9d09f044b9cd36c346a55af4050992da81c6a7f139ae063c9b3b86cc9f5373d6dac785af82b595f9fa432772fc1d417c7273c
-
Filesize
198B
MD552d1f60dce852bef60d766f3ec250c60
SHA11d339a2e49e32c0f0f97a26fc31c31791983ee1a
SHA256cc60389375de5efb4a01a719840a7254ceb03a045ced64e232a7abcf01925127
SHA512427c40a419ed10b45cd1352da865fcee4dead8831f7b9d22bc764d5b6c47e90efddf39fc441c5a7c44642d4b7cad6ad5fa68b5fb5c0f6a86c4e3b83d7d84de30
-
Filesize
298B
MD5af108c6bef3d59625c230f80cb5377ed
SHA1a5dd7020d1c082f9441fe20d2d6aaf47cb78345b
SHA256bb967d82af948d1493fa72daf9bdc56a67c5f994b74e1e55fb05f6fd2fe88016
SHA51248c2fe2a10acb4395caf29bc61a08a5e1d474d0d88219ee8d55910c3d537ebbe1b41534742afe71bc8a7977be4781b02ecf211677860379b08773bc891417398
-
Filesize
22.0MB
MD5009821b412ea7ae60b78edd42b7f0de5
SHA1de4c2faec33a0f922efe0ac3b5533e93330a9902
SHA256d1917339d73d35e7b916029bee4d262cfdd3813927a88c96e0f72fe0ae67f5f8
SHA5127631ef011ebbbe45ab8c153b5e6070714ab06b870a127984ec29a238437e5db66c4008590caa8e1c61d8b5aaae0e5690ae4d7ac57489df8e4c4133d6c8906c47