File name:

c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c

Full analysis: https://app.any.run/tasks/e1d5223b-02c4-434d-b4f7-42f32b38f2cb
Verdict: Malicious activity
Threats:

Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.

Analysis date: December 13, 2024, 20:19:42
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
opendir
remote
rat
gh0st
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

AD82832C1A32A2A9BB8244152A4A9F59

SHA1:

3D7BAE9027450B08C46615867FA17D4F9A17E530

SHA256:

C3E64C8B17AA6B12E28392A1479C54C6268C973B71A06C01C1B8A702D339DD3C

SSDEEP:

12288:urRK1SnVKdUkMaeCk5niB2pdWGhTskpP+cJPG1gktS4:urRwSVKdUk+Ck5iB2pdWGhNpWci7tS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GH0ST has been detected (SURICATA)

      • tbtool.exe (PID: 6092)
  • SUSPICIOUS

    • Connects to unusual port

      • tbtool.exe (PID: 6092)
    • Contacting a server suspected of hosting an CnC

      • tbtool.exe (PID: 6092)
    • Likely accesses (executes) a file from the Public directory

      • tbtool.exe (PID: 4576)
      • tbtool.exe (PID: 6092)
    • Executable content was dropped or overwritten

      • c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe (PID: 4328)
    • Process drops legitimate windows executable

      • c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe (PID: 4328)
    • Reads security settings of Internet Explorer

      • c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe (PID: 4328)
    • The process drops C-runtime libraries

      • c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe (PID: 4328)
  • INFO

    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 2928)
      • notepad.exe (PID: 2008)
      • notepad.exe (PID: 2144)
    • Reads the computer name

      • c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe (PID: 4328)
    • Checks supported languages

      • c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe (PID: 4328)
      • tbtool.exe (PID: 6092)
    • The sample compiled with chinese language support

      • c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe (PID: 4328)
    • The sample compiled with english language support

      • c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe (PID: 4328)
    • Manual execution by a user

      • notepad.exe (PID: 2928)
      • notepad.exe (PID: 2008)
      • notepad.exe (PID: 2144)
      • notepad.exe (PID: 5640)
      • notepad.exe (PID: 4128)
      • notepad.exe (PID: 1804)
      • OpenWith.exe (PID: 4244)
    • Reads CPU info

      • tbtool.exe (PID: 6092)
    • The process uses the downloaded file

      • c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe (PID: 4328)
    • Process checks computer location settings

      • c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe (PID: 4328)
    • Sends debugging messages

      • tbtool.exe (PID: 6092)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 4244)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (52.5)
.scr | Windows screen saver (22)
.dll | Win32 Dynamic Link Library (generic) (11)
.exe | Win32 Executable (generic) (7.5)
.exe | Generic Win/DOS Executable (3.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:28 10:38:52+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 413696
InitializedDataSize: 221184
UninitializedDataSize: -
EntryPoint: 0x13d65
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
11
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe tbtool.exe no specs #GH0ST tbtool.exe svchost.exe notepad.exe no specs notepad.exe no specs notepad.exe no specs notepad.exe no specs notepad.exe no specs notepad.exe no specs openwith.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4328"C:\Users\admin\Desktop\c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe" C:\Users\admin\Desktop\c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4576"C:\Users\Public\lsb_release\tbtool.exe" C:\Users\Public\lsb_release\tbtool.exec3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe
User:
admin
Company:
巧课教育科技(深圳)有限公司
Integrity Level:
MEDIUM
Description:
巧课客户端
Exit code:
3221226540
Version:
2.0.0.0
Modules
Images
c:\users\public\lsb_release\tbtool.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6092"C:\Users\Public\lsb_release\tbtool.exe" C:\Users\Public\lsb_release\tbtool.exe
c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe
User:
admin
Company:
巧课教育科技(深圳)有限公司
Integrity Level:
HIGH
Description:
巧课客户端
Version:
2.0.0.0
Modules
Images
c:\users\public\lsb_release\tbtool.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2928"C:\WINDOWS\system32\NOTEPAD.EXE" "C:\Users\admin\Desktop\zlib license.txt"C:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
2008"C:\WINDOWS\system32\NOTEPAD.EXE" "C:\Users\admin\Desktop\duilib license.txt"C:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
4128"C:\WINDOWS\system32\NOTEPAD.EXE" "C:\Users\admin\Desktop\directui license.txt"C:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
5640"C:\WINDOWS\system32\NOTEPAD.EXE" "C:\Users\admin\Desktop\duilib license troy.txt"C:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
1804"C:\WINDOWS\system32\NOTEPAD.EXE" "C:\Users\admin\Desktop\opencv license.txt"C:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
2144"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Config.iniC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
2 414
Read events
2 414
Write events
0
Delete events
0

Modification events

No data
Executable files
44
Suspicious files
2
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
4328c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exeC:\Users\Public\Downloads\7696.xml
MD5:
SHA256:
4328c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exeC:\Users\Public\lsb_release\0f40fc17.ppffli
MD5:D02D246642A3047D48B99DB0D562BA7D
SHA256:3E3CCEDBEBD4EECAFE953AB6B87BAA594210D1528F5E074C8EBA571355363BC4
4328c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exeC:\Users\Public\lsb_release\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:79EE4A2FCBE24E9A65106DE834CCDA4A
SHA256:9F7BDA59FAAFC8A455F98397A63A7F7D114EFC4E8A41808C791256EBF33C7613
4328c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exeC:\Users\Public\lsb_release\api-ms-win-crt-multibyte-l1-1-0.dllexecutable
MD5:19D7F2D6424C98C45702489A375D9E17
SHA256:A6B83B764555D517216E0E34C4945F7A7501C1B7A25308D8F85551FE353F9C15
4328c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exeC:\Users\Public\lsb_release\api-ms-win-core-processthreads-l1-1-1.dllexecutable
MD5:95C5B49AF7F2C7D3CD0BC14B1E9EFACB
SHA256:FF9B51AFF7FBEC8D7FE5CC478B12492A59B38B068DC2B518324173BB3179A0E1
4328c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exeC:\Users\Public\lsb_release\api-ms-win-crt-string-l1-1-0.dllexecutable
MD5:AD99C2362F64CDE7756B16F9A016A60F
SHA256:73AB2161A7700835B2A15B7487045A695706CC18BCEE283B114042570BB9C0AA
4328c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exeC:\Users\Public\lsb_release\api-ms-win-crt-convert-l1-1-0.dllexecutable
MD5:9DDEA3CC96E0FDD3443CC60D649931B3
SHA256:B7C3EBC36C84630A52D23D1C0E79D61012DFA44CDEBDF039AF31EC9E322845A5
4328c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exeC:\Users\Public\lsb_release\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:3F224766FE9B090333FDB43D5A22F9EA
SHA256:AE5E73416EB64BC18249ACE99F6847024ECEEA7CE9C343696C84196460F3A357
4328c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exeC:\Users\Public\Downloads\65745.xmlcompressed
MD5:988C5B7091B2AC6001E4AF8F124ED98F
SHA256:090FF5970158D89DFC9A5953A741DACE7B904E8AFE2774ED920821DC494431E5
4328c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exeC:\Users\Public\lsb_release\api-ms-win-core-synch-l1-2-0.dllexecutable
MD5:6E704280D632C2F8F2CADEFCAE25AD85
SHA256:758A2F9EF6908B51745DB50D89610FE1DE921D93B2DBEA919BFDBA813D5D8893
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
25
DNS requests
11
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6092
tbtool.exe
GET
200
142.250.186.36:80
http://www.google.com/
unknown
whitelisted
4328
c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe
GET
200
27.124.47.7:80
http://download.linuxroot.site/download/8358.dat
unknown
2220
svchost.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2220
svchost.exe
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
2220
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.212.110.162:443
www.bing.com
Akamai International B.V.
CZ
whitelisted
4
System
192.168.100.255:138
whitelisted
4328
c3e64c8b17aa6b12e28392a1479c54c6268c973b71a06c01c1b8a702d339dd3c.exe
27.124.47.7:80
download.linuxroot.site
BGPNET Global ASN
SG
unknown
2220
svchost.exe
23.48.23.177:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.177:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2220
svchost.exe
2.19.217.218:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
www.bing.com
  • 23.212.110.162
  • 23.212.110.185
  • 23.212.110.168
  • 23.212.110.179
  • 23.212.110.170
  • 23.212.110.177
  • 23.212.110.184
  • 23.212.110.176
  • 23.212.110.171
whitelisted
google.com
  • 142.250.185.142
whitelisted
download.linuxroot.site
  • 27.124.47.7
unknown
crl.microsoft.com
  • 23.48.23.177
  • 23.48.23.147
  • 23.48.23.156
  • 23.48.23.176
  • 23.48.23.164
  • 23.48.23.167
  • 23.48.23.143
  • 23.48.23.166
whitelisted
www.microsoft.com
  • 2.19.217.218
whitelisted
www.google.com
  • 142.250.186.36
whitelisted
book3.cookielive.top
  • 127.0.0.1
unknown
redhat.linuxroot.site
  • 137.220.135.142
unknown
self.events.data.microsoft.com
  • 52.182.143.208
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
Malware Command and Control Activity Detected
REMOTE [ANY.RUN] Gh0stRAT TCP Packet
Process
Message
tbtool.exe
tbtool.exe