File name:

dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe

Full analysis: https://app.any.run/tasks/c9f2672b-4a41-49ec-9cfa-2ee6d8ba0ca0
Verdict: Malicious activity
Threats:

Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.

Analysis date: June 20, 2024, 15:01:20
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
gh0st
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

44F4F8C76AF27D2D74414CE7987B73F0

SHA1:

C645AA364DB1182A399BA12ECB922633E619E61B

SHA256:

DD29303D0CDC7BA226E68BD9916423E4D38807C66F5D168FBFA3864AD405F858

SSDEEP:

98304:dQf3S4KBxR1SVSg5p5aZortaafopycdy9iHeLS5yBI2rbo98w6XBpjgDgk0/a8XH:mnIkbikHT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe (PID: 4284)
      • look2.exe (PID: 1592)
    • Creates a writable file in the system directory

      • look2.exe (PID: 1592)
    • GH0ST mutex has been found

      • look2.exe (PID: 1592)
  • SUSPICIOUS

    • Suspicious files were dropped or overwritten

      • look2.exe (PID: 1592)
    • Executable content was dropped or overwritten

      • look2.exe (PID: 1592)
      • dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe (PID: 4284)
    • Creates or modifies Windows services

      • look2.exe (PID: 1592)
  • INFO

    • Checks supported languages

      • dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe (PID: 4284)
      • look2.exe (PID: 1592)
      • HD_dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe (PID: 4720)
    • Reads the computer name

      • look2.exe (PID: 1592)
    • Create files in a temporary directory

      • dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe (PID: 4284)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:17 03:22:40+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 520192
InitializedDataSize: 819200
UninitializedDataSize: -
EntryPoint: 0x60d55
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.9.0.9
ProductVersionNumber: 2.9.0.9
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileVersion: 2.9.0.9
FileDescription: 应用程序
ProductName: PopWndL0g
ProductVersion: 2.9.0.9
CompanyName: RuntimeBroker
LegalCopyright: RuntimeBroker
Comments: PopWndL0g
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe look2.exe hd_dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe no specs dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1592C:\Users\admin\AppData\Local\Temp\\look2.exeC:\Users\admin\AppData\Local\Temp\look2.exe
dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe
User:
admin
Integrity Level:
HIGH
Description:
GradualChange Microsoft 基础类应用程序
Exit code:
0
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\look2.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2856"C:\Users\admin\AppData\Local\Temp\dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe" C:\Users\admin\AppData\Local\Temp\dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exeexplorer.exe
User:
admin
Company:
RuntimeBroker
Integrity Level:
MEDIUM
Description:
应用程序
Exit code:
3221226540
Version:
2.9.0.9
Modules
Images
c:\users\admin\appdata\local\temp\dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4284"C:\Users\admin\AppData\Local\Temp\dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe" C:\Users\admin\AppData\Local\Temp\dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe
explorer.exe
User:
admin
Company:
RuntimeBroker
Integrity Level:
HIGH
Description:
应用程序
Exit code:
0
Version:
2.9.0.9
Modules
Images
c:\users\admin\appdata\local\temp\dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
4720C:\Users\admin\AppData\Local\Temp\HD_dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exeC:\Users\admin\AppData\Local\Temp\HD_dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exedd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe
User:
admin
Integrity Level:
HIGH
Description:
Plants vs. Zombies
Exit code:
3221225781
Version:
1.0.0.1051
Modules
Images
c:\users\admin\appdata\local\temp\hd_dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
726
Read events
723
Write events
3
Delete events
0

Modification events

(PID) Process:(1592) look2.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\svchcst
Operation:writeName:Description
Value:
¹ÜÀí»ùÓÚ×é¼þ¶ÔÏóÄ£Ð͵ĺËÐÄ·þÎñ,Èç¹û·þÎñ±»½ûÓ㬼ÆËã»ú½«ÎÞ·¨Õý³£ÔËÐС£
(PID) Process:(1592) look2.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters
Operation:writeName:ServiceDll
Value:
C:\WINDOWS\system32\1759031.bat
(PID) Process:(1592) look2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Svchost
Operation:writeName:svchcst
Value:
svchcst
Executable files
4
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4284dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exeC:\Users\admin\AppData\Local\Temp\HD_dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exeexecutable
MD5:D53E9EAA3B444816C17E8FB13D1C89D6
SHA256:1D95AD5333BBC13DA1BB1608AC6D3D32AF36B4A2FE6258D3F894184C517049AB
4284dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exeC:\Users\admin\AppData\Local\Temp\look2.exeexecutable
MD5:2F3B6F16E33E28AD75F3FDAEF2567807
SHA256:86492EBF2D6F471A5EE92977318D099B3EA86175B5B7AE522237AE01D07A4857
1592look2.exeC:\WINDOWS\SysWOW64\1759031.batexecutable
MD5:AD78429308E69224CB45D4DB0022E4F8
SHA256:3667EDCC7DD8EEBCC28976E8485346FE532C99343CB4E8AF7760D074AE04EA61
4284dd29303d0cdc7ba226e68bd9916423e4d38807c66f5d168fbfa3864ad405f858.exeC:\Users\admin\AppData\Local\Temp\HD_X.datexecutable
MD5:6CD73ACA1F18CD9068C03C52383434B6
SHA256:114843567066626E13B22477A301DCFFD7BB6362BF4E099B65D01F1F5708C216
1592look2.exeC:\WINDOWS\SysWOW64\ini.initext
MD5:EDDC72F0C813D0DC18E4EECD213782BC
SHA256:1F42B63493A69954C8B7180BB1E98998794FC599E8E588BC5F4A35E9444F6DB0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
62
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3040
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
unknown
1544
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
2728
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
unknown
4556
SIHClient.exe
GET
200
2.17.245.133:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
4556
SIHClient.exe
GET
200
2.17.245.133:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
4656
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
6004
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2444
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3800
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4032
svchost.exe
239.255.255.250:1900
whitelisted
4656
SearchApp.exe
95.101.63.217:443
www.bing.com
Akamai International B.V.
GB
unknown
1544
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2364
svchcst.exe
114.55.25.226:442
kinh.xmcxmr.com
Hangzhou Alibaba Advertising Co.,Ltd.
CN
unknown
1060
svchost.exe
2.18.38.33:443
go.microsoft.com
Akamai International B.V.
NL
unknown
1544
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 95.101.63.217
  • 95.101.63.226
  • 95.101.63.224
  • 95.101.63.209
  • 95.101.63.225
  • 95.101.63.210
  • 95.101.63.218
  • 95.101.63.211
  • 95.101.63.227
whitelisted
login.live.com
  • 20.190.159.0
  • 40.126.31.67
  • 40.126.31.69
  • 40.126.31.73
  • 20.190.159.71
  • 20.190.159.64
  • 20.190.159.4
  • 20.190.159.68
  • 40.126.32.76
  • 20.190.160.14
  • 20.190.160.22
  • 20.190.160.17
  • 40.126.32.74
  • 40.126.32.136
  • 40.126.32.138
  • 40.126.32.140
whitelisted
kinh.xmcxmr.com
  • 114.55.25.226
malicious
go.microsoft.com
  • 2.18.38.33
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
self.events.data.microsoft.com
  • 20.189.173.6
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
  • 40.68.123.157
whitelisted
www.microsoft.com
  • 2.17.245.133
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info