Analysis

  • max time kernel
    116s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 15:09

General

  • Target

    1f371ab6545a5e56b41a0f6a5d40e520N.dll

  • Size

    137KB

  • MD5

    1f371ab6545a5e56b41a0f6a5d40e520

  • SHA1

    6c3cbb57296ecf11a8a97b8a7cf11341190d178d

  • SHA256

    6b260f8c12fb83057d2269105f558ffb43a691796cf3a30a4b4dcdee37a74212

  • SHA512

    a4d38c718657599faf3d6867197af6dc66f7968076fdc411ef67f39fd9baf91336153314672ce92b8e4dcb6e6591b8b1400d981b4f418e04999928001520bde5

  • SSDEEP

    3072:iR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUud:n25GgFny61mraj

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 15 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1f371ab6545a5e56b41a0f6a5d40e520N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1f371ab6545a5e56b41a0f6a5d40e520N.dll,#1
      2⤵
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1596
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3696
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 628
        3⤵
        • Program crash
        PID:3664
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1596 -ip 1596
    1⤵
      PID:1192
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
      • Boot or Logon Autostart Execution: Port Monitors
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:2416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\AppPatch\ComBack.Dll

      Filesize

      137KB

      MD5

      0e9db891d74685abd5c2b74395bfe487

      SHA1

      abbf5b7e3ff4d3d5ba3e36a6dc748faca46677c9

      SHA256

      ee0ac4f904f48fee1ec42b6eea77f99fc0bc4d3189b909379e68afd19e82020c

      SHA512

      beadb7fa02af54920c2bac63ba384cdf2dddf9f11d1376b5928a9fd13c8b875db9fd357eab1d85b34dcf09378a0c392a3c8ad41e3b35b473514ba325b243d3b8

    • C:\Windows\SysWOW64\com\comb.dll

      Filesize

      99B

      MD5

      5771870c0ff377e9b50a9828c9ac5a20

      SHA1

      84981aaad618d0fd43748c870ebd443f46926a4b

      SHA256

      baba53e496dd8a70116c6cb8d3ceb587f8ab05814a2da5e0e9757f703901d79b

      SHA512

      1581194bb6338b257fcb5701032064ad8b3ba7373f5a77df7b8386ab3292d81026686ede637cd3cf27016c64102c24c34312b15ac54c3d273dbbb4e323d97022

    • memory/1596-6-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/1596-7-0x0000000002330000-0x000000000234D000-memory.dmp

      Filesize

      116KB

    • memory/1596-12-0x0000000002330000-0x000000000234D000-memory.dmp

      Filesize

      116KB

    • memory/1596-5-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/1596-35-0x0000000043E50000-0x0000000043E77000-memory.dmp

      Filesize

      156KB

    • memory/1596-13-0x0000000002330000-0x000000000234D000-memory.dmp

      Filesize

      116KB

    • memory/1596-16-0x0000000002330000-0x000000000234D000-memory.dmp

      Filesize

      116KB

    • memory/1596-33-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/1596-8-0x0000000002330000-0x000000000234D000-memory.dmp

      Filesize

      116KB

    • memory/3696-18-0x0000000001840000-0x0000000001867000-memory.dmp

      Filesize

      156KB

    • memory/3696-24-0x0000000003550000-0x000000000356D000-memory.dmp

      Filesize

      116KB

    • memory/3696-23-0x0000000003550000-0x000000000356D000-memory.dmp

      Filesize

      116KB

    • memory/3696-29-0x0000000003550000-0x000000000356D000-memory.dmp

      Filesize

      116KB

    • memory/3696-30-0x0000000003550000-0x000000000356D000-memory.dmp

      Filesize

      116KB

    • memory/3696-28-0x0000000003550000-0x000000000356D000-memory.dmp

      Filesize

      116KB

    • memory/3696-27-0x0000000003550000-0x000000000356D000-memory.dmp

      Filesize

      116KB

    • memory/3696-31-0x0000000001840000-0x0000000001867000-memory.dmp

      Filesize

      156KB

    • memory/3696-14-0x0000000001840000-0x0000000001867000-memory.dmp

      Filesize

      156KB

    • memory/3696-15-0x0000000001280000-0x00000000012A3000-memory.dmp

      Filesize

      140KB

    • memory/3696-36-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB