Analysis

  • max time kernel
    135s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2025, 22:08

General

  • Target

    3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll

  • Size

    137KB

  • MD5

    34074195597501d855462ef005ac2cc8

  • SHA1

    059275c5e87bb9f86809eee7b362ace555691b7d

  • SHA256

    3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121

  • SHA512

    2f1c60152c9c245a2a95dbad8706258de746f541c6015b3a84ac647b8255f138e4369f10e1f2d09d8ee6d9ae23667b94ffb59bf728a9f61f5d72edee42af4bc6

  • SSDEEP

    3072:2R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:z25GgFny61mraY

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 16 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll,#1
      2⤵
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1380
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 616
        3⤵
        • Program crash
        PID:5000
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3140
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1380 -ip 1380
    1⤵
      PID:1896
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
        PID:1864
      • C:\Windows\system32\Spoolsv.exe
        Spoolsv.exe
        1⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:392

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\AppPatch\ComBack.Dll

        Filesize

        137KB

        MD5

        6703c3b58d71368115ab7e066811a513

        SHA1

        4da64481ac710c593c34e7ba820e2e07ae34b88c

        SHA256

        7e7e32e81fded0fddfcadd4dfad512a9544984b369569f5ecbaa7a750080518e

        SHA512

        463ec50e1e0ea528654f9dacc3fdc65fa80b007f6cb3e615e2bb89788f42de848c6dc81e70aa1c7df5552eb546081efa8692c63b34b608cb7f80358a41698ab0

      • C:\Windows\SysWOW64\Miscson.dll

        Filesize

        137KB

        MD5

        1e9adec6ccaa4aadce80292f94f1fccf

        SHA1

        a7473377332e2465770ee49df9ce430d23344dfd

        SHA256

        c5340ebded0843d0e3b5e05cc9d88b1934931750a940a6a4157a26a60c0c470d

        SHA512

        8f8bbfddd3de936fa5f929711d187541f41e10b44966be045e2068b504a66640867759f018ed04b5c31ca6604291b4ca1fd15085db5552fce5c390bb96e237df

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        128B

        MD5

        b270433348a1d987beb41f4801c6fe41

        SHA1

        da4347b2c538c7124dce1b5bd87ccc00e39882db

        SHA256

        a6bbe64741a379d800f45c1ec1826a9ec95199aca8361435a25e04f5cc26d60f

        SHA512

        9bae5d33f5e66ded8760fbcaa898aca19dc986131328b6e417773fdabbbb88cc05be3613b5d453f61a7aad49bd6fdc3ac0bd00dd4ceb4c590d3c5ee741bb0e27

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        247B

        MD5

        52dfbbef380364dab1bb3ba00e760560

        SHA1

        158bf3274ef2875fa6c96c1dc4ea9094535f04ed

        SHA256

        b2b63d8d8c8908737ab756c994c50b23f4040d50e90445e2aa4e07687eee6805

        SHA512

        7be938b2b224bfe7d91662f9f256d298d112710c576395c790b1b797749f27f72566f7e49c5df1d734f655d17af62f3005b26a052961bd3f479c9a55f9d748f9

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        290B

        MD5

        a8d92a0183b905906c7fe13b1243e9e3

        SHA1

        b744faf264b5b703c24c159f3a21c766ba223fc6

        SHA256

        8b579a19ad65c26d6f17a94a93faf04d46f13f26d5b24ddebb39630b2f47f7bd

        SHA512

        00477aca84c38b10a90bcc7021e22a34e8de84081d8dbc1631b9cf99c6309205699d2f4e2f4fb1f6a736982814fb8fd9e8c40837a064363044bdd1b56b97b028

      • C:\Windows\SysWOW64\scsimon.dll

        Filesize

        137KB

        MD5

        6b94c8b2e62ddbe8d29684a9da7dfaa4

        SHA1

        95be4904ed8c70d4e785f3fdc42a7bc217d35204

        SHA256

        61e4d502b2a8fe754d3ac7b94e0e94bfecc74da499026981eaa7163dcdec5ea2

        SHA512

        705e35a4f417478f41c5fa9bdb89afbf7b65decb10b51078a6ec30b2026fc67922ae90043432f2a3783ba1531573474ecedbf266df154a981629e72e18d2f1ea

      • memory/1380-14-0x0000000002350000-0x000000000236D000-memory.dmp

        Filesize

        116KB

      • memory/1380-16-0x0000000002350000-0x000000000236D000-memory.dmp

        Filesize

        116KB

      • memory/1380-6-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/1380-12-0x0000000002350000-0x000000000236D000-memory.dmp

        Filesize

        116KB

      • memory/1380-7-0x0000000002350000-0x000000000236D000-memory.dmp

        Filesize

        116KB

      • memory/1380-10-0x0000000002350000-0x000000000236D000-memory.dmp

        Filesize

        116KB

      • memory/1380-13-0x0000000002350000-0x000000000236D000-memory.dmp

        Filesize

        116KB

      • memory/1380-5-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/1380-43-0x0000000043E50000-0x0000000043E77000-memory.dmp

        Filesize

        156KB

      • memory/1380-41-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3140-17-0x0000000000F30000-0x0000000000F53000-memory.dmp

        Filesize

        140KB

      • memory/3140-28-0x0000000003540000-0x000000000355D000-memory.dmp

        Filesize

        116KB

      • memory/3140-27-0x0000000003540000-0x000000000355D000-memory.dmp

        Filesize

        116KB

      • memory/3140-30-0x0000000003540000-0x000000000355D000-memory.dmp

        Filesize

        116KB

      • memory/3140-29-0x0000000003540000-0x000000000355D000-memory.dmp

        Filesize

        116KB

      • memory/3140-25-0x0000000003540000-0x000000000355D000-memory.dmp

        Filesize

        116KB

      • memory/3140-44-0x0000000000FD0000-0x0000000000FF7000-memory.dmp

        Filesize

        156KB

      • memory/3140-45-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3140-24-0x0000000003540000-0x000000000355D000-memory.dmp

        Filesize

        116KB

      • memory/3140-18-0x0000000000FD0000-0x0000000000FF7000-memory.dmp

        Filesize

        156KB

      • memory/3140-15-0x0000000000FD0000-0x0000000000FF7000-memory.dmp

        Filesize

        156KB