| File name: | www.hgnghhngv.com |
| Full analysis: | https://app.any.run/tasks/b24a2dbd-fa31-4308-8337-40e23a058a99 |
| Verdict: | Malicious activity |
| Threats: | Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails. |
| Analysis date: | February 01, 2024, 07:30:08 |
| OS: | Windows 11 Professional (build: 22000, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | EE0D1967E6F6564CD19D9C30078CB893 |
| SHA1: | F0DEE9141EB1C7653190C27F1881EAF96BBF5C26 |
| SHA256: | C57646DB89CF3577B4488C84F0E71FC4041657EB6E52148915C358E0BE57665B |
| SSDEEP: | 98304:zjNsizFBZT82kiigeiB5sSoK0SmmYr0Ca/FQWVMRLB9xxYyJAG/DgbYkz19lfTVc:ViIZ4DeXIZ4Deaqt7tqBxqt |
| .exe | | | InstallShield setup (36.8) |
|---|---|---|
| .exe | | | Win32 Executable MS Visual C++ (generic) (26.6) |
| .exe | | | Win64 Executable (generic) (23.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2011:12:27 16:47:44+01:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 460288 |
| InitializedDataSize: | 167424 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x529af |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 6.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | M |
| FileDescription: | 149 |
| FileVersion: | 6.0.0.0 |
| LegalCopyright: | M |
| ProductVersion: | 6, 0, 0, 0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1020 | C:\Windows\SysWOW64\WerFault.exe -u -p 5632 -s 260 | C:\Windows\SysWOW64\WerFault.exe | Client.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.22000.653 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1776 | "C:\Program Files\WindowsApps\Microsoft.WindowsNotepad_11.2205.11.0_x64__8wekyb3d8bbwe\Notepad\Notepad.exe" "C:\Program Files\149\н¨Îı¾Îĵµ.txt" | C:\Program Files\WindowsApps\Microsoft.WindowsNotepad_11.2205.11.0_x64__8wekyb3d8bbwe\Notepad\Notepad.exe | — | www.hgnghhngv.com.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3712 | "C:\Program Files\149\NXYBankAssist.exe" | C:\Program Files\149\NXYBankAssist.exe | NXYBankAssist.exe | ||||||||||||
User: admin Company: 税友软件集团股份有限公司 Integrity Level: HIGH Exit code: 0 Version: 3.0.124.2836 Modules
| |||||||||||||||
| 4236 | "NXYBankAssist.exe" -hp | C:\Program Files\149\NXYBankAssist.exe | — | cmd.exe | |||||||||||
User: admin Company: 税友软件集团股份有限公司 Integrity Level: HIGH Exit code: 0 Version: 3.0.124.2836 Modules
| |||||||||||||||
| 4852 | "C:\Users\admin\Desktop\www.hgnghhngv.com.exe" | C:\Users\admin\Desktop\www.hgnghhngv.com.exe | — | explorer.exe | |||||||||||
User: admin Company: M Integrity Level: MEDIUM Description: 149 Exit code: 3221226540 Version: 6.0.0.0 Modules
| |||||||||||||||
| 4932 | C:\Windows\system32\cmd.exe /c ""C:\Program Files\149\н¨ Îı¾Îĵµ.bat" " | C:\Windows\SysWOW64\cmd.exe | — | www.hgnghhngv.com.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5344 | "C:\Users\admin\Desktop\www.hgnghhngv.com.exe" | C:\Users\admin\Desktop\www.hgnghhngv.com.exe | explorer.exe | ||||||||||||
User: admin Company: M Integrity Level: HIGH Description: 149 Exit code: 0 Version: 6.0.0.0 Modules
| |||||||||||||||
| 5632 | "Client.exe" -hp | C:\Program Files\149\Client.exe | cmd.exe | ||||||||||||
User: admin Company: 腾讯计算机系统有限公司 Integrity Level: HIGH Description: 腾讯游戏登录程序 Exit code: 3221225477 Version: 4.0.23.5 Modules
| |||||||||||||||
| 6068 | \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5344) www.hgnghhngv.com.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (5344) www.hgnghhngv.com.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (5344) www.hgnghhngv.com.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (5344) www.hgnghhngv.com.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (5344) www.hgnghhngv.com.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\Software\Microsoft\TIP\AggregateResults |
| Operation: | write | Name: | data |
Value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| |||
| (PID) Process: | (1020) WerFault.exe | Key: | \REGISTRY\A\{2b880773-8728-fd50-6072-f6c60db1c527}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (1020) WerFault.exe | Key: | \REGISTRY\A\{2b880773-8728-fd50-6072-f6c60db1c527}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5344 | www.hgnghhngv.com.exe | C:\Users\admin\AppData\Local\Temp\20240201073034174~YingInstall-TopFramePicture.bmp | image | |
MD5:A528A1EFB19F5BEE2FA74CD8650DAB24 | SHA256:D9295A5E215CF9F1C2DD5B9AA5DEB1EE46619202B5814296CA73777506846608 | |||
| 5344 | www.hgnghhngv.com.exe | C:\Users\admin\AppData\Local\Temp\20240201073034174~YingInstall-Language.ini | text | |
MD5:471452893A08C3CD834A0CDBF4899D95 | SHA256:BD6AABB0EA4D6BFC517B721C17ABA42BE54B6C7DE94FB20254824423458385BF | |||
| 5344 | www.hgnghhngv.com.exe | C:\Program Files\149\adortl70.bpl | executable | |
MD5:967E7EAC49ECAB6A44DCE09B1EBCFBA9 | SHA256:C3B7000CFB70B7D8ADE94B37C6CF1069CFF7242AF797C80726CACD22302D7BDF | |||
| 5344 | www.hgnghhngv.com.exe | C:\Program Files\149\EPLib.bpl | executable | |
MD5:120DC5EE6553F3690B457ACB3054D77D | SHA256:A0E14C10AA40BCC44ED38E2F7E5E47F496F0B7CE28058AD83DC8697C056BD14C | |||
| 5344 | www.hgnghhngv.com.exe | C:\Program Files\149\dbrtl70.bpl | binary | |
MD5:398DCE3B0CAA23CD6F73AD390324068C | SHA256:5B0FBCD19012ADE9E2AE4407E0875CFAF983655338F0DD5AE343AEB4F73693F7 | |||
| 5344 | www.hgnghhngv.com.exe | C:\Program Files\149\Lua51.dll | executable | |
MD5:127D5BF484AD700A335AF409180E219D | SHA256:73971F9B4C5C1EE56205A0BBC07075F5E0E6D6C2DA5357B99B7824628C5FF0D9 | |||
| 5344 | www.hgnghhngv.com.exe | C:\Program Files\149\NXYBankAssist.exe | executable | |
MD5:24817F01D849A31B87D9FCF5B23FD7FD | SHA256:27380A9A8E761F13A17AC3237BC8DF19CD180F3366E58C7B6EB7F1B176488A15 | |||
| 5344 | www.hgnghhngv.com.exe | C:\Program Files\149\ClientBase.dll | executable | |
MD5:9D4F8E7860E4B39C50F071F571667BD8 | SHA256:482C154D2145B3B9755BA96DF529F1D85C33A2BDA4A11CEF5C3F7C11086747AC | |||
| 5344 | www.hgnghhngv.com.exe | C:\Program Files\149\common.dll | executable | |
MD5:C6C7113CAEA9AA58A53F596A59125E24 | SHA256:5834DE3359FD6ACC9C1509E7B014FF79980AA9435290C6ECFE768BFE6D501079 | |||
| 5344 | www.hgnghhngv.com.exe | C:\Program Files\149\rtl70.bpl | executable | |
MD5:451CA77630FE988FF8EF61156420E815 | SHA256:DEF377D776869B391754E2EF7E130650F8CA7A5913695B204D59ECF061117F98 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1020 | WerFault.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?1277bed07dd4f5e1 | unknown | compressed | 4.66 Kb | unknown |
3752 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | binary | 471 b | unknown |
1412 | svchost.exe | GET | 200 | 2.16.164.42:80 | http://www.msftconnecttest.com/connecttest.txt | unknown | text | 22 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2664 | msedge.exe | 204.79.197.239:443 | edge.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
4588 | svchost.exe | 239.255.255.250:1900 | — | — | — | unknown |
5180 | msedge.exe | 224.0.0.251:5353 | — | — | — | unknown |
1412 | svchost.exe | 2.16.164.35:80 | — | Akamai International B.V. | NL | unknown |
5944 | svchost.exe | 2.18.97.153:443 | — | Akamai International B.V. | FR | unknown |
1020 | WerFault.exe | 20.189.173.21:443 | umwatson.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
1020 | WerFault.exe | 93.184.221.240:80 | ctldl.windowsupdate.com | EDGECAST | GB | whitelisted |
3712 | NXYBankAssist.exe | 206.238.199.149:2021 | — | TERAEXCH | ZA | unknown |
3752 | svchost.exe | 20.190.160.22:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3752 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
umwatson.events.data.microsoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com |
| whitelisted |
edge.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3712 | NXYBankAssist.exe | Malware Command and Control Activity Detected | REMOTE [ANY.RUN] Gh0stRAT Server Null Response TCP (Gh0stCringe) |
1412 | svchost.exe | Misc activity | ET INFO Microsoft Connection Test |