Analysis
-
max time kernel
101s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/03/2025, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
关于公司人事调整通知!.exe
Resource
win11-20250217-en
General
-
Target
关于公司人事调整通知!.exe
-
Size
211KB
-
MD5
c104dce7ac77b6154e5235e8bf0ecd19
-
SHA1
64d2165f1ecb6c68358592c65e29caf68937386a
-
SHA256
e41b8ea141681fb21c0a4bcf6af20529249e1637a3af9f46a68899e8e39f1b86
-
SHA512
249d4f5e8c3475a9bb4a735eca8c47c8758470645a43ebaf3899c2f30d2c79a293064ee563dfe7c3a54d3c24daaa28128cd9df10a6b74bd1b9cf562e388be744
-
SSDEEP
3072:dRsxM0KfuUfBbG6996HM0XU+aDe5UEGJSKz7ccRJMM3Ojl5My3LSEA0QchHnNt4f:dOzSG6hn+aCyIK3ccnMxjRA0Qchtivn
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/4396-37-0x0000000010000000-0x0000000010009000-memory.dmp family_gh0strat behavioral1/memory/4396-40-0x0000000000400000-0x0000000000473000-memory.dmp family_gh0strat behavioral1/memory/4700-74-0x0000000000400000-0x0000000000473000-memory.dmp family_gh0strat -
Gh0strat family
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rsbuur ignvnntd = "C:\\Program Files (x86)\\smsss.scr" 关于公司人事调整通知!.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rsbuur ignvnntd = "C:\\Program Files (x86)\\smsss.scr" 关于公司人事调整通知!.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5092 4700 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 关于公司人事调整通知!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 关于公司人事调整通知!.exe -
System Network Connections Discovery 1 TTPs 1 IoCs
Attempt to get a listing of network connections.
pid Process 4972 NETSTAT.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4972 NETSTAT.EXE -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 关于公司人事调整通知!.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 关于公司人事调整通知!.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 关于公司人事调整通知!.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 关于公司人事调整通知!.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 关于公司人事调整通知!.exe Key created \REGISTRY\USER\S-1-5-21-3517169085-2802914951-552339849-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 关于公司人事调整通知!.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3116 taskmgr.exe Token: SeSystemProfilePrivilege 3116 taskmgr.exe Token: SeCreateGlobalPrivilege 3116 taskmgr.exe Token: SeDebugPrivilege 4972 NETSTAT.EXE -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe -
Suspicious use of SendNotifyMessage 60 IoCs
pid Process 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe 3116 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 232 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2960 wrote to memory of 4972 2960 cmd.exe 94 PID 2960 wrote to memory of 4972 2960 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\关于公司人事调整通知!.exe"C:\Users\Admin\AppData\Local\Temp\关于公司人事调整通知!.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4396
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:232
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\关于公司人事调整通知!.exe"C:\Users\Admin\AppData\Local\Temp\关于公司人事调整通知!.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 4642⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4700 -ip 47001⤵PID:992
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3116
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\system32\NETSTAT.EXEnetstat -ano2⤵
- System Network Connections Discovery
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1