Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll
Resource
win10v2004-20250217-en
General
-
Target
3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll
-
Size
137KB
-
MD5
34074195597501d855462ef005ac2cc8
-
SHA1
059275c5e87bb9f86809eee7b362ace555691b7d
-
SHA256
3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121
-
SHA512
2f1c60152c9c245a2a95dbad8706258de746f541c6015b3a84ac647b8255f138e4369f10e1f2d09d8ee6d9ae23667b94ffb59bf728a9f61f5d72edee42af4bc6
-
SSDEEP
3072:2R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:z25GgFny61mraY
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/1380-6-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat behavioral2/memory/1380-5-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat behavioral2/memory/1380-41-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat behavioral2/memory/3140-45-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat -
Gh0strat family
-
Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor\Driver = "scsimon.dll" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor\Driver = "scsimon.dll" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon\Ports Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\USB Monitor Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Ports Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\IPP Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\SCSI Port Monitor rundll32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint Spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint\OfflinePorts Spoolsv.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Spooler\ImagePath = "Spoolsv.exe" rundll32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Spooler\ImagePath = "Spoolsv.exe" svchost.exe -
ACProtect 1.3x - 1.4x DLL software 16 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/1380-6-0x0000000010000000-0x000000001001C000-memory.dmp acprotect behavioral2/memory/1380-5-0x0000000010000000-0x000000001001C000-memory.dmp acprotect behavioral2/memory/1380-10-0x0000000002350000-0x000000000236D000-memory.dmp acprotect behavioral2/memory/1380-7-0x0000000002350000-0x000000000236D000-memory.dmp acprotect behavioral2/memory/1380-16-0x0000000002350000-0x000000000236D000-memory.dmp acprotect behavioral2/memory/1380-14-0x0000000002350000-0x000000000236D000-memory.dmp acprotect behavioral2/memory/1380-12-0x0000000002350000-0x000000000236D000-memory.dmp acprotect behavioral2/memory/1380-13-0x0000000002350000-0x000000000236D000-memory.dmp acprotect behavioral2/memory/3140-24-0x0000000003540000-0x000000000355D000-memory.dmp acprotect behavioral2/memory/3140-25-0x0000000003540000-0x000000000355D000-memory.dmp acprotect behavioral2/memory/3140-29-0x0000000003540000-0x000000000355D000-memory.dmp acprotect behavioral2/memory/3140-30-0x0000000003540000-0x000000000355D000-memory.dmp acprotect behavioral2/memory/3140-28-0x0000000003540000-0x000000000355D000-memory.dmp acprotect behavioral2/memory/3140-27-0x0000000003540000-0x000000000355D000-memory.dmp acprotect behavioral2/memory/1380-41-0x0000000010000000-0x000000001001C000-memory.dmp acprotect behavioral2/memory/3140-45-0x0000000010000000-0x000000001001C000-memory.dmp acprotect -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\scsimon.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\scsimon.dll svchost.exe File created C:\Windows\SysWOW64\scsimon.dll svchost.exe File opened for modification C:\Windows\SysWOW64\com\comb.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\com\comb.dll svchost.exe File opened for modification C:\Windows\SysWOW64\scsimon.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\Miscson.dll svchost.exe File created C:\Windows\SysWOW64\Miscson.dll svchost.exe File opened for modification C:\Windows\SysWOW64\Miscson.dll rundll32.exe File created C:\Windows\SysWOW64\Miscson.dll rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1380 set thread context of 3140 1380 rundll32.exe 89 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\AppPatch\AcSvcst.dll rundll32.exe File opened for modification C:\Windows\AppPatch\ComBack.Dll rundll32.exe File created C:\Windows\AppPatch\ComBack.Dll rundll32.exe File opened for modification C:\Windows\AppPatch\AcSvcst.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5000 1380 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 Spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID Spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 Spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID Spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID Spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID Spoolsv.exe -
Modifies data under HKEY_USERS 22 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" Spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts Spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts Spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Devices Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" Spoolsv.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Fax = "winspool,Ne02:,15,45" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Send To OneNote 2016 = "winspool,nul:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" Spoolsv.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices Spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Send To OneNote 2016 = "winspool,nul:,15,45" Spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" Spoolsv.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1380 rundll32.exe Token: SeDebugPrivilege 3140 svchost.exe Token: SeDebugPrivilege 1380 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4728 wrote to memory of 1380 4728 rundll32.exe 85 PID 4728 wrote to memory of 1380 4728 rundll32.exe 85 PID 4728 wrote to memory of 1380 4728 rundll32.exe 85 PID 1380 wrote to memory of 3140 1380 rundll32.exe 89 PID 1380 wrote to memory of 3140 1380 rundll32.exe 89 PID 1380 wrote to memory of 3140 1380 rundll32.exe 89 PID 1380 wrote to memory of 3140 1380 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c04a7b759f0cd4e867fae287ccd003abdf719f57fabfdb304a1e6baf3209121.dll,#12⤵
- Boot or Logon Autostart Execution: Port Monitors
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 6163⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe -k rundll323⤵
- Boot or Logon Autostart Execution: Port Monitors
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1380 -ip 13801⤵PID:1896
-
C:\Windows\system32\Spoolsv.exeSpoolsv.exe1⤵PID:1864
-
C:\Windows\system32\Spoolsv.exeSpoolsv.exe1⤵
- Boot or Logon Autostart Execution: Port Monitors
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:392
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD56703c3b58d71368115ab7e066811a513
SHA14da64481ac710c593c34e7ba820e2e07ae34b88c
SHA2567e7e32e81fded0fddfcadd4dfad512a9544984b369569f5ecbaa7a750080518e
SHA512463ec50e1e0ea528654f9dacc3fdc65fa80b007f6cb3e615e2bb89788f42de848c6dc81e70aa1c7df5552eb546081efa8692c63b34b608cb7f80358a41698ab0
-
Filesize
137KB
MD51e9adec6ccaa4aadce80292f94f1fccf
SHA1a7473377332e2465770ee49df9ce430d23344dfd
SHA256c5340ebded0843d0e3b5e05cc9d88b1934931750a940a6a4157a26a60c0c470d
SHA5128f8bbfddd3de936fa5f929711d187541f41e10b44966be045e2068b504a66640867759f018ed04b5c31ca6604291b4ca1fd15085db5552fce5c390bb96e237df
-
Filesize
128B
MD5b270433348a1d987beb41f4801c6fe41
SHA1da4347b2c538c7124dce1b5bd87ccc00e39882db
SHA256a6bbe64741a379d800f45c1ec1826a9ec95199aca8361435a25e04f5cc26d60f
SHA5129bae5d33f5e66ded8760fbcaa898aca19dc986131328b6e417773fdabbbb88cc05be3613b5d453f61a7aad49bd6fdc3ac0bd00dd4ceb4c590d3c5ee741bb0e27
-
Filesize
247B
MD552dfbbef380364dab1bb3ba00e760560
SHA1158bf3274ef2875fa6c96c1dc4ea9094535f04ed
SHA256b2b63d8d8c8908737ab756c994c50b23f4040d50e90445e2aa4e07687eee6805
SHA5127be938b2b224bfe7d91662f9f256d298d112710c576395c790b1b797749f27f72566f7e49c5df1d734f655d17af62f3005b26a052961bd3f479c9a55f9d748f9
-
Filesize
290B
MD5a8d92a0183b905906c7fe13b1243e9e3
SHA1b744faf264b5b703c24c159f3a21c766ba223fc6
SHA2568b579a19ad65c26d6f17a94a93faf04d46f13f26d5b24ddebb39630b2f47f7bd
SHA51200477aca84c38b10a90bcc7021e22a34e8de84081d8dbc1631b9cf99c6309205699d2f4e2f4fb1f6a736982814fb8fd9e8c40837a064363044bdd1b56b97b028
-
Filesize
137KB
MD56b94c8b2e62ddbe8d29684a9da7dfaa4
SHA195be4904ed8c70d4e785f3fdc42a7bc217d35204
SHA25661e4d502b2a8fe754d3ac7b94e0e94bfecc74da499026981eaa7163dcdec5ea2
SHA512705e35a4f417478f41c5fa9bdb89afbf7b65decb10b51078a6ec30b2026fc67922ae90043432f2a3783ba1531573474ecedbf266df154a981629e72e18d2f1ea