Analysis

  • max time kernel
    117s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 21:25

General

  • Target

    9fdb8a568e8f11d704f818a5d3723a8c0d470e8d8351c72a84c1b77cdb2b79d1N.dll

  • Size

    137KB

  • MD5

    873f7b0057d35ab411b1699f2e27e440

  • SHA1

    2814cb0c82b2dd6a8ced8f07b01fdae86af3b1a6

  • SHA256

    9fdb8a568e8f11d704f818a5d3723a8c0d470e8d8351c72a84c1b77cdb2b79d1

  • SHA512

    6ef2a0663a92857e64af676ebdc4b09f3df7b6a91a987916d653e8cbe1f1db63873b1bb5225d81f47fbc0925000a9d5c4eb0ecca3e28ff853c10c4d7ea6224d8

  • SSDEEP

    3072:TR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu/:+25GgFny61mraF

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 16 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9fdb8a568e8f11d704f818a5d3723a8c0d470e8d8351c72a84c1b77cdb2b79d1N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\9fdb8a568e8f11d704f818a5d3723a8c0d470e8d8351c72a84c1b77cdb2b79d1N.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1028
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 616
        3⤵
        • Program crash
        PID:888
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4928 -ip 4928
    1⤵
      PID:2804
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
      • Boot or Logon Autostart Execution: Port Monitors
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:2024

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\AppPatch\ComBack.Dll

      Filesize

      137KB

      MD5

      f73729e6fedb27992ec6ca7c84c5178f

      SHA1

      06f4fc3630e24b352efa7f0596bf804134f19fc6

      SHA256

      ed4666d35affd6f8a75964a41a97fef960f1b1016c475e03deff1a0f3d40c1c8

      SHA512

      bbcbba7be55341a076a6848c01b997698174781d981c5dea9b94c1e2e209a9de8e289e1c8d4dfe726a655e17c22d5a98ad39da5bfcc99193bc2153e4ccae33a8

    • C:\Windows\SysWOW64\com\comb.dll

      Filesize

      128B

      MD5

      a92ac733cf8a4383f4d8a661b60ee562

      SHA1

      30d35afb52cd0428ea0a54a37a1ba912bb3a544a

      SHA256

      6e65f75e05981b01ff59afbf57eb0a0ea4b088b6049242f68f9d4bdc8616a8e6

      SHA512

      48c1ad6f35766284f752d6503f05021f0c80ae7640015578c68384441ba89ac8c19c419e74acf9b000c19569fca1dfce18f8747ed21a2f5f32f9dd6d3a99bfc6

    • memory/1028-31-0x0000000002790000-0x00000000027AD000-memory.dmp

      Filesize

      116KB

    • memory/1028-15-0x00000000004A0000-0x00000000004C3000-memory.dmp

      Filesize

      140KB

    • memory/1028-19-0x0000000000A40000-0x0000000000A67000-memory.dmp

      Filesize

      156KB

    • memory/1028-28-0x0000000002790000-0x00000000027AD000-memory.dmp

      Filesize

      116KB

    • memory/1028-29-0x0000000002790000-0x00000000027AD000-memory.dmp

      Filesize

      116KB

    • memory/1028-18-0x0000000000A40000-0x0000000000A67000-memory.dmp

      Filesize

      156KB

    • memory/1028-30-0x0000000002790000-0x00000000027AD000-memory.dmp

      Filesize

      116KB

    • memory/1028-26-0x0000000002790000-0x00000000027AD000-memory.dmp

      Filesize

      116KB

    • memory/1028-25-0x0000000002790000-0x00000000027AD000-memory.dmp

      Filesize

      116KB

    • memory/1028-14-0x0000000000A40000-0x0000000000A67000-memory.dmp

      Filesize

      156KB

    • memory/1028-36-0x0000000000A40000-0x0000000000A67000-memory.dmp

      Filesize

      156KB

    • memory/4928-4-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4928-10-0x0000000002830000-0x000000000284D000-memory.dmp

      Filesize

      116KB

    • memory/4928-7-0x0000000002830000-0x000000000284D000-memory.dmp

      Filesize

      116KB

    • memory/4928-16-0x0000000002830000-0x000000000284D000-memory.dmp

      Filesize

      116KB

    • memory/4928-17-0x0000000002830000-0x000000000284D000-memory.dmp

      Filesize

      116KB

    • memory/4928-5-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4928-13-0x0000000002830000-0x000000000284D000-memory.dmp

      Filesize

      116KB

    • memory/4928-12-0x0000000002830000-0x000000000284D000-memory.dmp

      Filesize

      116KB

    • memory/4928-34-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4928-35-0x0000000043E50000-0x0000000043E77000-memory.dmp

      Filesize

      156KB

    • memory/4928-6-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB