File name:

汇联支付.exe

Full analysis: https://app.any.run/tasks/56d44a5a-e86d-4be5-b20a-670e1a96b27d
Verdict: Malicious activity
Threats:

Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.

Analysis date: January 16, 2025, 13:07:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
remote
rat
gh0st
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
MD5:

EABC234727934AD76F332E7CFB28C80B

SHA1:

C89D84A40075A2C53DA3BE5EB17E3FD95D6B7CC8

SHA256:

5E1D7275B0ABD484C15F186690DB73C42E861311DA3F5F048563636336933B4A

SSDEEP:

196608:sYPk8xvJf2gWctP1gNxbCls/ORvO/T9AlQwGypE6UuSkfiHR:9s8xhtWk1VGWO+lr99SciHR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GH0ST has been detected (SURICATA)

      • GamePlusPlus.exe (PID: 7068)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 汇联支付.exe (PID: 6728)
      • APP.exe (PID: 6816)
    • Reads the date of Windows installation

      • 汇联支付.exe (PID: 6728)
    • Executable content was dropped or overwritten

      • 汇联支付.exe (PID: 6728)
    • Checks Windows Trust Settings

      • APP.exe (PID: 6816)
      • 汇联支付.exe (PID: 6728)
    • Executes application which crashes

      • 汇联支付.exe (PID: 6728)
    • The process executes via Task Scheduler

      • GamePlusPlus.exe (PID: 7068)
    • Application launched itself

      • GamePlusPlus.exe (PID: 7068)
    • Contacting a server suspected of hosting an CnC

      • GamePlusPlus.exe (PID: 7068)
  • INFO

    • Reads the computer name

      • 汇联支付.exe (PID: 6728)
      • APP.exe (PID: 6816)
      • GamePlusPlus.exe (PID: 3832)
    • Checks proxy server information

      • 汇联支付.exe (PID: 6728)
      • WerFault.exe (PID: 6180)
    • Checks supported languages

      • 汇联支付.exe (PID: 6728)
      • APP.exe (PID: 6816)
      • GamePlusPlus.exe (PID: 7068)
      • GamePlusPlus.exe (PID: 3832)
    • Disables trace logs

      • 汇联支付.exe (PID: 6728)
    • Reads Environment values

      • 汇联支付.exe (PID: 6728)
      • APP.exe (PID: 6816)
    • Reads the machine GUID from the registry

      • 汇联支付.exe (PID: 6728)
      • APP.exe (PID: 6816)
    • Creates files in the program directory

      • 汇联支付.exe (PID: 6728)
    • The sample compiled with english language support

      • 汇联支付.exe (PID: 6728)
    • Process checks computer location settings

      • 汇联支付.exe (PID: 6728)
    • Reads the software policy settings

      • 汇联支付.exe (PID: 6728)
      • APP.exe (PID: 6816)
      • WerFault.exe (PID: 6180)
    • The process uses the downloaded file

      • 汇联支付.exe (PID: 6728)
      • APP.exe (PID: 6816)
    • Create files in a temporary directory

      • APP.exe (PID: 6816)
      • 汇联支付.exe (PID: 6728)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • APP.exe (PID: 6816)
    • Reads CPU info

      • GamePlusPlus.exe (PID: 7068)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:01:12 01:30:31+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 11
CodeSize: 23549952
InitializedDataSize: 16384
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription: XMM556
FileVersion: 1.0.0.0
InternalName: XMM556.exe
LegalCopyright: Copyright © 2024
OriginalFileName: XMM556.exe
ProductName: XMM556
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
8
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 汇联支付.exe app.exe no specs werfault.exe #GH0ST gameplusplus.exe gameplusplus.exe no specs gameplusplus.exe no specs gameplusplus.exe no specs 汇联支付.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3832vrdashboard.exe -duplication_gpu_checkC:\Program Files\Weekplus\GamePlusPlus.exeGamePlusPlus.exe
User:
admin
Company:
Valve Corporation
Integrity Level:
HIGH
Description:
VR Dashboard
Exit code:
4294967295
Version:
2.8.8
Modules
Images
c:\program files\weekplus\gameplusplus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4144vrdashboard.exe -duplication_gpu_checkC:\Program Files\Weekplus\GamePlusPlus.exeGamePlusPlus.exe
User:
admin
Company:
Valve Corporation
Integrity Level:
HIGH
Description:
VR Dashboard
Exit code:
4294967295
Version:
2.8.8
Modules
Images
c:\program files\weekplus\gameplusplus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6180C:\WINDOWS\system32\WerFault.exe -u -p 6728 -s 2508C:\Windows\System32\WerFault.exe
汇联支付.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\oleaut32.dll
6588"C:\Users\admin\AppData\Local\Temp\汇联支付.exe" C:\Users\admin\AppData\Local\Temp\汇联支付.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
XMM556
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\汇联支付.exe
c:\windows\system32\ntdll.dll
6728"C:\Users\admin\AppData\Local\Temp\汇联支付.exe" C:\Users\admin\AppData\Local\Temp\汇联支付.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
XMM556
Exit code:
3221225477
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\汇联支付.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6816"C:\Program Files\Weekplus\APP.exe" C:\Program Files\Weekplus\APP.exe汇联支付.exe
User:
admin
Integrity Level:
HIGH
Description:
LMNK
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\program files\weekplus\app.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7068"C:\Program Files\Weekplus\GamePlusPlus.exe" 1C:\Program Files\Weekplus\GamePlusPlus.exe
svchost.exe
User:
admin
Company:
Valve Corporation
Integrity Level:
HIGH
Description:
VR Dashboard
Version:
2.8.8
Modules
Images
c:\program files\weekplus\gameplusplus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7120vrdashboard.exe -duplication_gpu_checkC:\Program Files\Weekplus\GamePlusPlus.exeGamePlusPlus.exe
User:
admin
Company:
Valve Corporation
Integrity Level:
HIGH
Description:
VR Dashboard
Exit code:
4294967295
Version:
2.8.8
Modules
Images
c:\program files\weekplus\gameplusplus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
15 278
Read events
15 245
Write events
30
Delete events
3

Modification events

(PID) Process:(6728) æ±‡è”支付.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\æ±?è?æ?¯ä»?_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6728) æ±‡è”支付.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\æ±?è?æ?¯ä»?_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6728) æ±‡è”支付.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\æ±?è?æ?¯ä»?_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6728) æ±‡è”支付.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\æ±?è?æ?¯ä»?_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6728) æ±‡è”支付.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\æ±?è?æ?¯ä»?_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6728) æ±‡è”支付.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\æ±?è?æ?¯ä»?_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6728) æ±‡è”支付.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\æ±?è?æ?¯ä»?_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6728) æ±‡è”支付.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\æ±?è?æ?¯ä»?_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6728) æ±‡è”支付.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\æ±?è?æ?¯ä»?_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6728) æ±‡è”支付.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\æ±?è?æ?¯ä»?_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
4
Suspicious files
7
Text files
6
Unknown types
1

Dropped files

PID
Process
Filename
Type
6180WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_汇联支付.exe_e344663a13219186b8ff8a39e2e3256395cbf9_96772244_b91d17b1-d9cc-437c-b917-088965efafea\Report.wer
MD5:
SHA256:
6180WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\汇联支付.exe.6728.dmp
MD5:
SHA256:
6728汇联支付.exeC:\Program Files\Weekplus\openvr_api.dllexecutable
MD5:366710963F426B54B6E06657B26A5CBB
SHA256:EF1DAFE72F4EDC90E500A5E5FEF04479F3BFE54AF856D00C046028799058E8D2
6728汇联支付.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_fhqr4p4g.a5g.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6728汇联支付.exeC:\Program Files\Weekplus\steam_api64.dllexecutable
MD5:543515A345CC88CB93413953F06F34A4
SHA256:DCFAA13AA419A0641917205957DBE15AA472E7CF09A28CF8D3CF429598E67799
6728汇联支付.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_5rbxgzf5.1gl.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6180WerFault.exeC:\Windows\appcompat\Programs\Amcache.hvebinary
MD5:0992B07666D1CFFF23005F2B483A9DBE
SHA256:A2FDC60A4E83565ED05F02114A6613836A807BD3ED776DA50DB96394109ED52F
6816APP.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_z5jvkjhg.rm2.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6728汇联支付.exeC:\Program Files\Weekplus\mpclient.datbinary
MD5:8D64D97085F6AA11D1375879095D996C
SHA256:57C15F61210E60E0204CF5BD0AAA0984BAF363B7D7FB82DB576DA919C223DC64
6180WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:239A5B2C2D0DFF93D561539CD9EB1F6E
SHA256:31BAADC230675604527D9B7668BD6F4445108C2AB1D4D90F9A07A228603CBCA0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
40
DNS requests
21
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6288
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.164:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6180
WerFault.exe
GET
200
23.48.23.164:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6180
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3564
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3564
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.21.65.154:443
www.bing.com
Akamai International B.V.
NL
whitelisted
3564
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.46
whitelisted
www.bing.com
  • 2.21.65.154
  • 2.21.65.132
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 2.17.190.73
whitelisted
login.live.com
  • 20.190.160.22
  • 40.126.32.68
  • 20.190.160.17
  • 40.126.32.133
  • 20.190.160.20
  • 40.126.32.76
  • 40.126.32.136
  • 40.126.32.134
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
wwwchongqingget-1328031368.cos.ap-chongqing.myqcloud.com
  • 183.66.100.51
  • 183.66.100.45
whitelisted
www19daxcsdaf-1328031368.cos.ap-guangzhou.myqcloud.com
  • 159.75.57.35
  • 159.75.57.69
whitelisted
wwwwgetmore-1328031368.cos.ap-chongqing.myqcloud.com
  • 183.66.100.45
  • 183.66.100.51
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.48.23.164
  • 23.48.23.143
  • 23.48.23.173
  • 23.48.23.166
  • 23.48.23.176
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Misc activity
ET INFO Tencent Cloud Storage Domain in DNS Lookup (myqcloud .com)
6728
汇联支付.exe
Misc activity
ET INFO Observed Tencent Cloud Storage Domain (myqcloud .com in TLS SNI)
2192
svchost.exe
Misc activity
ET INFO Tencent Cloud Storage Domain in DNS Lookup (myqcloud .com)
6728
汇联支付.exe
Misc activity
ET INFO Observed Tencent Cloud Storage Domain (myqcloud .com in TLS SNI)
2192
svchost.exe
Misc activity
ET INFO Tencent Cloud Storage Domain in DNS Lookup (myqcloud .com)
6728
汇联支付.exe
Misc activity
ET INFO Observed Tencent Cloud Storage Domain (myqcloud .com in TLS SNI)
7068
GamePlusPlus.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] Win32/Gh0stRat Keep-Alive
7068
GamePlusPlus.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Gh0stRat TCP Packet
7068
GamePlusPlus.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Win32/Gh0stRat Keep-Alive M1
7068
GamePlusPlus.exe
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Win32/Gh0stRat Keep-Alive M2
No debug info