Analysis

  • max time kernel
    117s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2025 08:24

General

  • Target

    5bd74752836cfe38efcb7077bc3a89c2eb32b01a807e67f89d4da9025d04f839N.dll

  • Size

    137KB

  • MD5

    18125263be2eafbd7d13c251bd0b5fa0

  • SHA1

    b2e2680058edd9c2ae355d230acc9be6dcc51565

  • SHA256

    5bd74752836cfe38efcb7077bc3a89c2eb32b01a807e67f89d4da9025d04f839

  • SHA512

    d650cca481048d37e8339b28e0355ff9b78dfd4e3171f22c66bd6045585270247dd44338c81c50a7d2e5b3d3ad77d5a724a544a248333235e2da058267fa857f

  • SSDEEP

    3072:+R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuD:r25GgFny61mrap

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 14 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5bd74752836cfe38efcb7077bc3a89c2eb32b01a807e67f89d4da9025d04f839N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\5bd74752836cfe38efcb7077bc3a89c2eb32b01a807e67f89d4da9025d04f839N.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4644
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:212
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 616
        3⤵
        • Program crash
        PID:228
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4644 -ip 4644
    1⤵
      PID:4992
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
      • Boot or Logon Autostart Execution: Port Monitors
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:4432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\AppPatch\ComBack.Dll

      Filesize

      137KB

      MD5

      17fca4a0b8d334694c16e1d53340276f

      SHA1

      165d9d17653191155fbfd2de74f22b33e2b7df75

      SHA256

      b2237721c71f257bf4400babe46814755b632f4a72e2ab6d90f7bc91a75da1ef

      SHA512

      00b14b1cf620be0d389c378799545eeb100ca6a775cce24f64bffbdec0ba20f3c925c986b6881d20227bd652df1387824786fc882415af640d4edd170f9801f9

    • C:\Windows\SysWOW64\com\comb.dll

      Filesize

      128B

      MD5

      810bc13bab011436d3446650b01d3622

      SHA1

      77d21890b3b758beb2a4edae9a6bfabfd2256dd4

      SHA256

      08995439c488d02c7b8acfac025763b1f6118f8e5b83b1a78182725008915653

      SHA512

      897c26d9d8468a6d64b713377e67348db5aeb00d39a6bb227780b15a400343952ad0a670b6f2845101c5f67e24c3ed09c60a7613c3a41c7162883e07456e3e02

    • memory/212-27-0x0000000002BC0000-0x0000000002BDD000-memory.dmp

      Filesize

      116KB

    • memory/212-25-0x0000000002BC0000-0x0000000002BDD000-memory.dmp

      Filesize

      116KB

    • memory/212-31-0x0000000000980000-0x00000000009A7000-memory.dmp

      Filesize

      156KB

    • memory/212-29-0x0000000002BC0000-0x0000000002BDD000-memory.dmp

      Filesize

      116KB

    • memory/212-24-0x0000000002BC0000-0x0000000002BDD000-memory.dmp

      Filesize

      116KB

    • memory/212-16-0x00000000005A0000-0x00000000005C3000-memory.dmp

      Filesize

      140KB

    • memory/212-17-0x0000000000980000-0x00000000009A7000-memory.dmp

      Filesize

      156KB

    • memory/212-18-0x0000000000980000-0x00000000009A7000-memory.dmp

      Filesize

      156KB

    • memory/212-30-0x0000000002BC0000-0x0000000002BDD000-memory.dmp

      Filesize

      116KB

    • memory/212-28-0x0000000002BC0000-0x0000000002BDD000-memory.dmp

      Filesize

      116KB

    • memory/4644-6-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4644-13-0x00000000031E0000-0x00000000031FD000-memory.dmp

      Filesize

      116KB

    • memory/4644-7-0x00000000031E0000-0x00000000031FD000-memory.dmp

      Filesize

      116KB

    • memory/4644-5-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4644-14-0x00000000031E0000-0x00000000031FD000-memory.dmp

      Filesize

      116KB

    • memory/4644-10-0x00000000031E0000-0x00000000031FD000-memory.dmp

      Filesize

      116KB

    • memory/4644-12-0x00000000031E0000-0x00000000031FD000-memory.dmp

      Filesize

      116KB

    • memory/4644-32-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4644-35-0x0000000043E50000-0x0000000043E77000-memory.dmp

      Filesize

      156KB