Analysis

  • max time kernel
    135s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2025, 20:14

General

  • Target

    1889a4f41fe4053045a502abb252d2877348f052407f358b6d58b81f1834d76f.dll

  • Size

    137KB

  • MD5

    ac7af93c997f62d01973f9f3bd42e76c

  • SHA1

    1bee8895bbf39a4f0e6ffb9b3baa2922b9a93aad

  • SHA256

    1889a4f41fe4053045a502abb252d2877348f052407f358b6d58b81f1834d76f

  • SHA512

    9f39f6d4e7fc8ddaf450acd470f3501505da420c1214c719ec28b99bb9ae51e98e7880652338dd901eb7aaaf459325d62544b42483b9fe2101edd071de47b42a

  • SSDEEP

    3072:LR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUup:m25GgFny61mraj

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 15 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1889a4f41fe4053045a502abb252d2877348f052407f358b6d58b81f1834d76f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1889a4f41fe4053045a502abb252d2877348f052407f358b6d58b81f1834d76f.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3128
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 616
        3⤵
        • Program crash
        PID:412
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3128 -ip 3128
    1⤵
      PID:3832
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
        PID:1952
      • C:\Windows\system32\Spoolsv.exe
        Spoolsv.exe
        1⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2316

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\AppPatch\ComBack.Dll

        Filesize

        137KB

        MD5

        1e03996da606b72a8a2fabbb2947fa55

        SHA1

        f397e03185d0085f043cf83ba17500e87cda0f20

        SHA256

        fccdf0a974b0799c80c591008e8ee6c5c7f511cc2e3c8b51fc0af23b86ff25f8

        SHA512

        b0e577e61f756edb6851e437638273d9e20b5caa22d8d57ffbf20585f0168f7a473b5306205715ab5dac7d59a671a2d0cb3ffaf15ffc5f334991d0125c9115e6

      • C:\Windows\SysWOW64\Miscson.dll

        Filesize

        137KB

        MD5

        0e67aee14f9b6334165e48f365f046e6

        SHA1

        1f579bc28e4af16be4a0415deff63086fd577698

        SHA256

        0d1bd177cd93daa343cf3112936976cbcf87515ea81590e3a415b136a9577c15

        SHA512

        0741946c9522a3174e51d0cbbf8d78ec66e2f99e2c1c12c84b87d9d23cb4b3816092595464500b0159412711af437fbf45c53acabe4abec1d573663561e91b6a

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        99B

        MD5

        b73aa4fdeb60ca78b28e71ddbe3739ae

        SHA1

        470393ea20188bd93f9610409f0db948311f6ba8

        SHA256

        416646789b07047baaab4fd1144d200a4c0459c8dae5f6c5b11dc5eb86809e13

        SHA512

        9327e4bfa2acdf1a4af42610913339a0fea0adcb2cb00971a4c055a61bf4749d47017c5b9f001e942c3a71a34eae9fe50c8e62211c0c633ee3e0966228798134

      • C:\Windows\SysWOW64\scsimon.dll

        Filesize

        137KB

        MD5

        753850792e94a7079797b3d5c8703471

        SHA1

        5efceaced1eeca7a7a6f7c31352004d66b63cdb8

        SHA256

        542203818bf4bc4d7e6642b3e3d9a1a15301bb4773d3288c8cf138ad36e48647

        SHA512

        411011cbde241a0f3906a26774a0d72d3c583efe665230cdadf62437fcb0710dc71e8241b3c33a4f6d31c2875e8a9ae2896bedfbe48c10fcb179300875c2907d

      • memory/388-26-0x0000000002890000-0x00000000028AD000-memory.dmp

        Filesize

        116KB

      • memory/388-30-0x0000000002890000-0x00000000028AD000-memory.dmp

        Filesize

        116KB

      • memory/388-42-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/388-25-0x0000000002890000-0x00000000028AD000-memory.dmp

        Filesize

        116KB

      • memory/388-16-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/388-18-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/388-17-0x00000000003B0000-0x00000000003D3000-memory.dmp

        Filesize

        140KB

      • memory/388-29-0x0000000002890000-0x00000000028AD000-memory.dmp

        Filesize

        116KB

      • memory/388-31-0x0000000002890000-0x00000000028AD000-memory.dmp

        Filesize

        116KB

      • memory/388-22-0x0000000000400000-0x0000000000427000-memory.dmp

        Filesize

        156KB

      • memory/388-28-0x0000000002890000-0x00000000028AD000-memory.dmp

        Filesize

        116KB

      • memory/3128-10-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB

      • memory/3128-15-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB

      • memory/3128-12-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB

      • memory/3128-7-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB

      • memory/3128-5-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3128-40-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3128-41-0x0000000043E50000-0x0000000043E77000-memory.dmp

        Filesize

        156KB

      • memory/3128-6-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3128-13-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB

      • memory/3128-14-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB