File name: | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9 |
Full analysis: | https://app.any.run/tasks/3676db02-c2d7-4ad2-9825-b3d935441982 |
Verdict: | Malicious activity |
Threats: | Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails. |
Analysis date: | December 14, 2024, 12:20:08 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections |
MD5: | 6A3D6CA7819AB95ADD89A52BCF5C38B1 |
SHA1: | 606BF1706687D2896D401FE13A0AE60898D4D780 |
SHA256: | 3D05A3574CC1A041E721BA95F25DE138517D65E2B4CB60854013D56B086728A9 |
SSDEEP: | 24576:cBissSh156qCDN8NezCDUomnfDhMYIVP:cBissSRDfNezCQomfF2V |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
Subsystem: | Windows GUI |
---|---|
SubsystemVersion: | 4 |
ImageVersion: | - |
OSVersion: | 4 |
EntryPoint: | 0x32fd6 |
UninitializedDataSize: | - |
InitializedDataSize: | 647168 |
CodeSize: | 581632 |
LinkerVersion: | 6 |
PEType: | PE32 |
ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
TimeStamp: | 2024:10:23 12:19:21+00:00 |
MachineType: | Intel 386 or later, and compatibles |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6480 | "C:\Users\admin\Desktop\3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe" | C:\Users\admin\Desktop\3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
6864 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-ExecutionPolicy Unrestricted | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6872 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6892 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6904 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6936 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBehaviorMonitoring $true | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6952 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6980 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableBlockAtFirstSeen $true | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6996 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
|
(PID) Process: | (5540) Acrobat.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2034283098-2252572593-1072577386-2659511007-3245387615-27016815-3920691934 |
Operation: | write | Name: | DisplayName |
Value: Adobe Acrobat Reader Protected Mode | |||
(PID) Process: | (6160) Acrobat.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\ExitSection |
Operation: | write | Name: | bLastExitNormal |
Value: 0 | |||
(PID) Process: | (6160) Acrobat.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVEntitlement |
Operation: | write | Name: | bSynchronizeOPL |
Value: 0 | |||
(PID) Process: | (6160) Acrobat.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral |
Operation: | write | Name: | uLastAppLaunchTimeStamp |
Value: | |||
(PID) Process: | (6160) Acrobat.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVGeneral |
Operation: | write | Name: | iNumAcrobatLaunches |
Value: 7 | |||
(PID) Process: | (6160) Acrobat.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\HomeWelcomeFirstMile |
Operation: | write | Name: | iCardCountShown |
Value: 3 | |||
(PID) Process: | (6160) Acrobat.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\DLLInjection |
Operation: | write | Name: | bBlockDLLInjection |
Value: 0 | |||
(PID) Process: | (6160) Acrobat.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVEntitlement |
Operation: | write | Name: | sProductGUID |
Value: 4143524F4241545F475549445F4E474C5F44554D4D5900 | |||
(PID) Process: | (6160) Acrobat.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AVEntitlement |
Operation: | write | Name: | sProductGUID |
Value: 4143524F5F5245534944554500 | |||
(PID) Process: | (6160) Acrobat.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\AdobeViewer |
Operation: | delete value | Name: | ProductInfoCache |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | C:\Users\Public\Downloads\vst4ySmvG3wizb.dat | — | |
MD5:— | SHA256:— | |||
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | C:\Users\Public\stdio\api-ms-win-core-file-l1-2-0.dll | executable | |
MD5:79EE4A2FCBE24E9A65106DE834CCDA4A | SHA256:9F7BDA59FAAFC8A455F98397A63A7F7D114EFC4E8A41808C791256EBF33C7613 | |||
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | C:\Users\Public\stdio\api-ms-win-core-synch-l1-2-0.dll | executable | |
MD5:6E704280D632C2F8F2CADEFCAE25AD85 | SHA256:758A2F9EF6908B51745DB50D89610FE1DE921D93B2DBEA919BFDBA813D5D8893 | |||
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | C:\Users\Public\stdio\api-ms-win-crt-stdio-l1-1-0.dll | executable | |
MD5:D5166AB3034F0E1AA679BFA1907E5844 | SHA256:7BCAB4CA00FB1F85FEA29DD3375F709317B984A6F3B9BA12B8CF1952F97BEEE5 | |||
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | C:\Users\Public\stdio\api-ms-win-crt-filesystem-l1-1-0.dll | executable | |
MD5:228C6BBE1BCE84315E4927392A3BAEE5 | SHA256:AC0CEC8644340125507DD0BC9A90B1853A2D194EB60A049237FB5E752D349065 | |||
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | C:\Users\Public\stdio\api-ms-win-core-localization-l1-2-0.dll | executable | |
MD5:23BD405A6CFD1E38C74C5150EEC28D0A | SHA256:A7FA48DE6C06666B80184AFEE7E544C258E0FB11399AB3FE47D4E74667779F41 | |||
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | C:\Users\Public\stdio\api-ms-win-crt-convert-l1-1-0.dll | executable | |
MD5:9DDEA3CC96E0FDD3443CC60D649931B3 | SHA256:B7C3EBC36C84630A52D23D1C0E79D61012DFA44CDEBDF039AF31EC9E322845A5 | |||
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | C:\Users\Public\stdio\0f40fc17.ppf | binary | |
MD5:BBA2E0EC20CDCB6CF637E21284FC29BE | SHA256:6EDFDC4856F81BBA4B5EE19D06266C9792B400CF564D15D6518BCD934D5CD70E | |||
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | C:\Users\Public\stdio\api-ms-win-core-timezone-l1-1-0.dll | executable | |
MD5:C9A55DE62E53D747C5A7FDDEDEF874F9 | SHA256:B5C725BBB475B5C06CC6CB2A2C3C70008F229659F88FBA25CCD5D5C698D06A4B | |||
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | C:\Users\Public\stdio\api-ms-win-crt-heap-l1-1-0.dll | executable | |
MD5:1776A2B85378B27825CF5E5A3A132D9A | SHA256:675B1B82DD485CC8C8A099272DB9241D0D2A7F45424901F35231B79186EC47EE |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | GET | 200 | 27.124.47.7:80 | http://download.linuxroot.site/download/3190.dat | unknown | — | — | — |
— | — | OPTIONS | 204 | 3.233.129.217:443 | https://p13n.adobe.io/psdk/v2/content?surfaceId=ACROBAT_READER_MASTER_SURFACEID&surfaceId=DC_READER_LAUNCH_CARD&surfaceId=DC_Reader_RHP_Banner&surfaceId=DC_Reader_RHP_Retention&surfaceId=Edit_InApp_Aug2020&surfaceId=DC_FirstMile_Right_Sec_Surface&surfaceId=DC_Reader_Upsell_Cards&surfaceId=DC_FirstMile_Home_View_Surface&surfaceId=DC_Reader_RHP_Intent_Banner&surfaceId=DC_Reader_Disc_LHP_Banner&surfaceId=DC_Reader_Edit_LHP_Banner&surfaceId=DC_Reader_Convert_LHP_Banner&surfaceId=DC_Reader_Sign_LHP_Banner&surfaceId=DC_Reader_More_LHP_Banner&surfaceId=DC_Reader_Disc_LHP_Retention&adcProductLanguage=en-us&adcVersion=23.1.20093&adcProductType=SingleClientMini&adcOSType=WIN&adcCountryCode=MY&adcXAPIClientID=api_reader_desktop_win_23.1.20093&encodingScheme=BASE_64 | unknown | — | — | — |
6092 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.177:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6092 | svchost.exe | GET | 200 | 23.48.23.177:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 52.6.155.20:443 | https://p13n.adobe.io/psdk/v2/content?surfaceId=ACROBAT_READER_MASTER_SURFACEID&surfaceId=DC_READER_LAUNCH_CARD&surfaceId=DC_Reader_RHP_Banner&surfaceId=DC_Reader_RHP_Retention&surfaceId=Edit_InApp_Aug2020&surfaceId=DC_FirstMile_Right_Sec_Surface&surfaceId=DC_Reader_Upsell_Cards&surfaceId=DC_FirstMile_Home_View_Surface&surfaceId=DC_Reader_RHP_Intent_Banner&surfaceId=DC_Reader_Disc_LHP_Banner&surfaceId=DC_Reader_Edit_LHP_Banner&surfaceId=DC_Reader_Convert_LHP_Banner&surfaceId=DC_Reader_Sign_LHP_Banner&surfaceId=DC_Reader_More_LHP_Banner&surfaceId=DC_Reader_Disc_LHP_Retention&adcProductLanguage=en-us&adcVersion=23.1.20093&adcProductType=SingleClientMini&adcOSType=WIN&adcCountryCode=MY&adcXAPIClientID=api_reader_desktop_win_23.1.20093&encodingScheme=BASE_64 | unknown | binary | 187 b | whitelisted |
— | — | GET | 200 | 23.48.23.149:443 | https://acroipm2.adobe.com/23/rdr_64x/ENU/win/nooem/none/consumer/message.zip | unknown | compressed | 141 Kb | whitelisted |
— | — | GET | 200 | 184.30.20.134:443 | https://armmf.adobe.com/onboarding/smskillreader.txt | unknown | text | 120 b | whitelisted |
— | — | GET | 200 | 23.218.208.137:443 | https://geo2.adobe.com/ | unknown | text | 50 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6092 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 104.126.37.155:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6480 | 3d05a3574cc1a041e721ba95f25de138517d65e2b4cb60854013d56b086728a9.exe | 27.124.47.7:80 | download.linuxroot.site | BGPNET Global ASN | SG | unknown |
4712 | MoUsoCoreWorker.exe | 23.48.23.177:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6092 | svchost.exe | 23.48.23.177:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6092 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
download.linuxroot.site |
| unknown |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
www.baiodu.com |
| unknown |
hehua.cookielive.top |
| malicious |
geo2.adobe.com |
| whitelisted |
p13n.adobe.io |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
— | — | Malware Command and Control Activity Detected | REMOTE [ANY.RUN] Gh0stRAT TCP Packet |
Process | Message |
---|---|
vtreamsetup.exe | vtreamsetup.exe |