File name:

1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe

Full analysis: https://app.any.run/tasks/4bd35e96-119e-47f4-8df6-6d4b58e740bb
Verdict: Malicious activity
Threats:

Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.

Analysis date: June 02, 2024, 17:35:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
remote
rat
gh0st
gh0stcringe
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

D65ACC2321B1580BC524B991FAD0F78A

SHA1:

884ED62A599B781384F45292659BEF2B1CD5844B

SHA256:

1F4C1B7370B3BA6EF950A84589FC458CF5B3A019A9BFE21AAB986D0A26785291

SSDEEP:

24576:9N0narkxl9wVX9wVlCQQQHLnLi3MQPAZ3ML7PAr:9SarkP9wVX9wVlCQQQHLnLi3MQPAZ3Mw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe (PID: 3912)
    • Connects to the CnC server

      • 1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe (PID: 3912)
    • GH0ST has been detected (SURICATA)

      • 1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe (PID: 3912)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe (PID: 3912)
    • Contacting a server suspected of hosting an CnC

      • 1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe (PID: 3912)
    • Connects to unusual port

      • 1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe (PID: 3912)
  • INFO

    • Reads the computer name

      • 1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe (PID: 3912)
    • Checks proxy server information

      • 1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe (PID: 3912)
    • Checks supported languages

      • 1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe (PID: 3912)
    • Reads CPU info

      • 1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe (PID: 3912)
    • Reads the software policy settings

      • slui.exe (PID: 4928)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (52.5)
.scr | Windows screen saver (22)
.dll | Win32 Dynamic Link Library (generic) (11)
.exe | Win32 Executable (generic) (7.5)
.exe | Generic Win/DOS Executable (3.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:06:24 12:36:22+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 159744
InitializedDataSize: 614400
UninitializedDataSize: -
EntryPoint: 0xb634
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 13.0.2206.0
ProductVersionNumber: 13.0.2206.0
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: 360.cn
FileDescription: 360极速浏览器
FileVersion: 13.0.2206.0
InternalName: chrome_exe
LegalCopyright: (C) 360.cn All Rights Reserved.
OriginalFileName: 360chrome.exe
ProductName: 360极速浏览器
ProductVersion: 13.0.2206.0
CompanyShortName: 360.cn
ProductShortName: 360极速浏览器
LastChange: acb4892127638aa5210ba22dc0d0a6aa207729fd
OfficialBuild: 1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GH0ST 1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1512C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2540C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3912"C:\Users\admin\AppData\Local\Temp\1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe" C:\Users\admin\AppData\Local\Temp\1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe
explorer.exe
User:
admin
Company:
360.cn
Integrity Level:
MEDIUM
Description:
360极速浏览器
Version:
13.0.2206.0
Modules
Images
c:\users\admin\appdata\local\temp\1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4928"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 355
Read events
1 354
Write events
1
Delete events
0

Modification events

(PID) Process:(1512) slui.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:@%SystemRoot%\System32\sppcomapi.dll,-3200
Value:
Software Licensing
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
55
DNS requests
21
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5632
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
5632
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
4680
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
unknown
920
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
1492
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
unknown
5524
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
5524
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
636
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5140
MoUsoCoreWorker.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5632
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4364
svchost.exe
239.255.255.250:1900
unknown
3912
1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe
149.88.76.85:718
ATT-INTERNET4
US
unknown
5632
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5632
svchost.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5632
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
unknown
4680
SearchApp.exe
2.23.209.148:443
www.bing.com
Akamai International B.V.
GB
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 88.221.169.152
whitelisted
www.bing.com
  • 2.23.209.185
  • 2.23.209.133
  • 2.23.209.130
  • 2.23.209.140
  • 2.23.209.149
  • 2.23.209.150
  • 2.23.209.148
  • 2.23.209.182
  • 2.23.209.187
whitelisted
r.bing.com
  • 2.23.209.148
  • 2.23.209.140
  • 2.23.209.187
  • 2.23.209.182
  • 2.23.209.133
  • 2.23.209.130
  • 2.23.209.150
  • 2.23.209.149
  • 2.23.209.185
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.67
  • 20.190.159.68
  • 20.190.159.2
  • 20.190.159.0
  • 20.190.159.73
  • 40.126.31.69
  • 40.126.31.71
whitelisted
go.microsoft.com
  • 2.18.97.227
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted

Threats

PID
Process
Class
Message
3912
1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Gh0stCringe TCP Initial Packet
1 ETPRO signatures available at the full report
Process
Message
1f4c1b7370b3ba6ef950a84589fc458cf5b3a019a9bfe21aab986d0a26785291.exe
ÂÌÉ«Æô¶¯