Analysis

  • max time kernel
    134s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2025, 23:09

General

  • Target

    500be4f476a6e64002c2cc0df19c91b409ab94d63d0e41983d881c9348f91f70.dll

  • Size

    137KB

  • MD5

    48c25c8febbe92e9329f8b6995950f05

  • SHA1

    9ac0827456cb3214409d758ec88b943812036217

  • SHA256

    500be4f476a6e64002c2cc0df19c91b409ab94d63d0e41983d881c9348f91f70

  • SHA512

    00607438bdd868dc30cf83c3cd414d50069b7229d0099b564fab30fc3389ad4130a680ddc6b21667aebf68dddb04a28b3dd2a858501eb1fff31772643b0330c0

  • SSDEEP

    3072:WR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu9:T25GgFny61mraT

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 14 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\500be4f476a6e64002c2cc0df19c91b409ab94d63d0e41983d881c9348f91f70.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\500be4f476a6e64002c2cc0df19c91b409ab94d63d0e41983d881c9348f91f70.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4912
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 616
        3⤵
        • Program crash
        PID:4692
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4912 -ip 4912
    1⤵
      PID:4776
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
        PID:3020
      • C:\Windows\system32\Spoolsv.exe
        Spoolsv.exe
        1⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:3704

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\AppPatch\ComBack.Dll

        Filesize

        137KB

        MD5

        23ca603ec097be2719be0ec6a9f53943

        SHA1

        14c14bdda527ebe03ad9ec7b0c2d41768cc9d553

        SHA256

        aefdb3e77fb8665f71aa5c25f3e767cd6f546c8e63c8f8fb8b8943842686dde1

        SHA512

        8cbdbfd28346bda24b00afc9df5fb228ac696c98841a8f7a30886424e76720e079b6112fa47ebe236a00bc4175c0140aea0ff3bb7ac8411b4751996521d5c83f

      • C:\Windows\SysWOW64\Miscson.dll

        Filesize

        137KB

        MD5

        178f5eaadc306fcbc9e97b4d04de3ee3

        SHA1

        aac65ace6c40c723722de55cc07a3714fa2496f8

        SHA256

        d03dbf61bddea04b8ce1f4ad6b85529e2c0753afcbf061c9eb0929f53ac0c508

        SHA512

        91af32db57f54af58dabd0f9e8b7680414fecdfdfaa6db44ce74db7d9cb9f8ca172de07baaf841b74cdfb7466608d5264bbc8e3a93c41704f30a508eab654d50

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        128B

        MD5

        e30ce427133b6160609c8a1237ca14f8

        SHA1

        33c72abfd2bdcda546b88f633f3a9005a7e8bed2

        SHA256

        4126dc26c5c62f32f602bf0f6ee4611dff04e52bc21ddaafd78d8bd4d82cb0a6

        SHA512

        b19eb4cda4b6bf680a111c215d7a827c03b1341f10469ad64222aa09497c61f22742d58c238a0e778c8d69cec88afb4b2521fda23f73e33fdd3cc4d9b7ead6ae

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        247B

        MD5

        0616227d03a68d5a55c400a35b44e615

        SHA1

        e714e10087cb7237c09dcb5bf20539b5ef29ba89

        SHA256

        364cf424255199c0308d60053c53d3b872dbd325673c09ec2fd871f8abb3d4bc

        SHA512

        5490420c86285d32cc3a4ae9ed8cf6eaee1931df585fd99ce8a26627b608ea79cfacdb671c35a7b1f40a09fac9f3d23c9ab6c1d26e89fdf36655f9d68f75ae1c

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        326B

        MD5

        2eca247e66ba8541ec03dea039ad0d12

        SHA1

        0544502bb5b593ce424bcb078120f1387590e7cc

        SHA256

        faff30f65bce7b6fbd56840ddac56f491e0e290037b2d623a1063ebfa61e6a25

        SHA512

        780a1d331b6ae6f908decbe68bf8366a986d368dfdccdbd3b0f1d4885d6f9dc3413f253e4f2816a226798157da5572948cb7ca19067e5c7af9e7994d0bc0b2a3

      • C:\Windows\SysWOW64\scsimon.dll

        Filesize

        137KB

        MD5

        a04c71443d83615ce1863ca1e5a67626

        SHA1

        1ea7c16099886cedd77649fb0f45125430b9fd47

        SHA256

        d6dfe99d635690c9742254e94743cc122d617aa550da95a9392859e142b99b19

        SHA512

        756ff47ef060dfe952dda7ea08939e15663add993caf06f5dd701dc17bb1271abe529fc5e5e19b804436e7b90737bb00ffd58ee4d268714dfa5a2b2083a4212e

      • memory/4448-25-0x0000000002B90000-0x0000000002BAD000-memory.dmp

        Filesize

        116KB

      • memory/4448-27-0x0000000002B90000-0x0000000002BAD000-memory.dmp

        Filesize

        116KB

      • memory/4448-16-0x0000000000D50000-0x0000000000D77000-memory.dmp

        Filesize

        156KB

      • memory/4448-31-0x0000000000D50000-0x0000000000D77000-memory.dmp

        Filesize

        156KB

      • memory/4448-18-0x0000000000D50000-0x0000000000D77000-memory.dmp

        Filesize

        156KB

      • memory/4448-17-0x0000000000590000-0x00000000005B3000-memory.dmp

        Filesize

        140KB

      • memory/4448-24-0x0000000002B90000-0x0000000002BAD000-memory.dmp

        Filesize

        116KB

      • memory/4448-29-0x0000000002B90000-0x0000000002BAD000-memory.dmp

        Filesize

        116KB

      • memory/4448-30-0x0000000002B90000-0x0000000002BAD000-memory.dmp

        Filesize

        116KB

      • memory/4448-28-0x0000000002B90000-0x0000000002BAD000-memory.dmp

        Filesize

        116KB

      • memory/4912-10-0x0000000003160000-0x000000000317D000-memory.dmp

        Filesize

        116KB

      • memory/4912-5-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/4912-14-0x0000000003160000-0x000000000317D000-memory.dmp

        Filesize

        116KB

      • memory/4912-12-0x0000000003160000-0x000000000317D000-memory.dmp

        Filesize

        116KB

      • memory/4912-42-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/4912-44-0x0000000043E50000-0x0000000043E77000-memory.dmp

        Filesize

        156KB

      • memory/4912-13-0x0000000003160000-0x000000000317D000-memory.dmp

        Filesize

        116KB

      • memory/4912-7-0x0000000003160000-0x000000000317D000-memory.dmp

        Filesize

        116KB

      • memory/4912-6-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB