Analysis

  • max time kernel
    116s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2025, 11:22

General

  • Target

    236bc5f3d5b4a1435ef10b477ff15093562dca0ae87e6c9fd5bcad760ba497f5N.dll

  • Size

    137KB

  • MD5

    9e98bbd8300724a3d379d9dcc537b6d0

  • SHA1

    d7e44e2e8eedee7d5ce003043eb6c1acf84f4d83

  • SHA256

    236bc5f3d5b4a1435ef10b477ff15093562dca0ae87e6c9fd5bcad760ba497f5

  • SHA512

    d2c2c686365b37f2de062f341e2eb58b7061dec11d611e1889560498c933fd47544ddeb5b8f824bd6243966e3dcd85be0f63ddc43c6437d4741b4d4c4e013129

  • SSDEEP

    3072:OR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu/:b25GgFny61mra9

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 15 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\236bc5f3d5b4a1435ef10b477ff15093562dca0ae87e6c9fd5bcad760ba497f5N.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\236bc5f3d5b4a1435ef10b477ff15093562dca0ae87e6c9fd5bcad760ba497f5N.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3172
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 616
        3⤵
        • Program crash
        PID:1072
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3172 -ip 3172
    1⤵
      PID:100
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
      • Boot or Logon Autostart Execution: Port Monitors
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:3888

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\AppPatch\ComBack.Dll

      Filesize

      137KB

      MD5

      f83f53cec86be35e04c2454583c6c102

      SHA1

      4965e38c80cba7ca6a38d6ac309abad5c7002bdc

      SHA256

      1247c83edce17c174b248232fae3721759311d90e3e17a9cfe3450dc47a378a5

      SHA512

      cf62beb602a88df1b065db4662c3116d8b49f3ddf7718edca1db4f29ee6107ccde84f72872392625f9753a25b6ab68cee4a040651a005e175733c532fa4274eb

    • C:\Windows\SysWOW64\com\comb.dll

      Filesize

      128B

      MD5

      ccbb6b226eaa3d16bb2a9da2ece945cd

      SHA1

      711b50df603ee866f68670d2adfc3b73e61cf557

      SHA256

      f4b8b4cf11f76a2854d6a8b5060da68361f9964587821c7b91ea25fa5f964915

      SHA512

      37b7ed1be50470bbcaa8d8df70743b3c4d6ada3e534ef7ade6c3faf498137a5ea63b67d736c8b07d4961bf1d052e02b7508373fa5a4bcbe68d2aaf93454b1107

    • memory/1876-26-0x0000000000C40000-0x0000000000C67000-memory.dmp

      Filesize

      156KB

    • memory/1876-25-0x0000000000DE0000-0x0000000000DFD000-memory.dmp

      Filesize

      116KB

    • memory/1876-28-0x0000000000DE0000-0x0000000000DFD000-memory.dmp

      Filesize

      116KB

    • memory/1876-29-0x0000000000DE0000-0x0000000000DFD000-memory.dmp

      Filesize

      116KB

    • memory/1876-31-0x0000000000DE0000-0x0000000000DFD000-memory.dmp

      Filesize

      116KB

    • memory/1876-16-0x0000000000C40000-0x0000000000C67000-memory.dmp

      Filesize

      156KB

    • memory/1876-30-0x0000000000DE0000-0x0000000000DFD000-memory.dmp

      Filesize

      116KB

    • memory/1876-15-0x0000000000890000-0x00000000008B3000-memory.dmp

      Filesize

      140KB

    • memory/1876-14-0x0000000000C40000-0x0000000000C67000-memory.dmp

      Filesize

      156KB

    • memory/1876-24-0x0000000000DE0000-0x0000000000DFD000-memory.dmp

      Filesize

      116KB

    • memory/3172-6-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/3172-5-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/3172-7-0x0000000002A60000-0x0000000002A7D000-memory.dmp

      Filesize

      116KB

    • memory/3172-4-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/3172-17-0x0000000002A60000-0x0000000002A7D000-memory.dmp

      Filesize

      116KB

    • memory/3172-12-0x0000000002A60000-0x0000000002A7D000-memory.dmp

      Filesize

      116KB

    • memory/3172-13-0x0000000002A60000-0x0000000002A7D000-memory.dmp

      Filesize

      116KB

    • memory/3172-10-0x0000000002A60000-0x0000000002A7D000-memory.dmp

      Filesize

      116KB

    • memory/3172-32-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/3172-35-0x0000000043E50000-0x0000000043E77000-memory.dmp

      Filesize

      156KB