Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2025, 06:57

General

  • Target

    f904446dc48eb60c60f1e7a73e3653af6ff675a350fc79d89c4f39f32797749f.dll

  • Size

    137KB

  • MD5

    c2c7233de0790191f333c43057375fea

  • SHA1

    dbd8c6495579314dd3e76c7fec997d5fbb78378c

  • SHA256

    f904446dc48eb60c60f1e7a73e3653af6ff675a350fc79d89c4f39f32797749f

  • SHA512

    d87479f171996e43e47037e58be8c1132ee29638b34b57c2330b89e5023b58d291558a0d13b3eeec979136c5acdefaaec09a23cf27928cbe81d6f9bb8cc5d54d

  • SSDEEP

    3072:KR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuX:f25GgFny61mrap

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 15 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f904446dc48eb60c60f1e7a73e3653af6ff675a350fc79d89c4f39f32797749f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f904446dc48eb60c60f1e7a73e3653af6ff675a350fc79d89c4f39f32797749f.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4884
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 624
        3⤵
        • Program crash
        PID:4208
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 960 -ip 960
    1⤵
      PID:3196
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
        PID:2228
      • C:\Windows\system32\Spoolsv.exe
        Spoolsv.exe
        1⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:3744

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\AppPatch\ComBack.Dll

        Filesize

        137KB

        MD5

        24e9f7812110bde56b87a5f1b0d5e2ee

        SHA1

        983c665dab00b165d815b43893f6e2e2a01a932b

        SHA256

        6057a26db1559a6174ecc43931a54018e01153a8b516f09d11ef01bb6f9116c0

        SHA512

        f329b070957d29e5349a3dc26fb80193068a8bbadda113171b42500c4ec610ca3efd803df3ec777357a7ec79dde5e7a62d0d097db96e1430e491c661c61e9172

      • C:\Windows\SysWOW64\Miscson.dll

        Filesize

        137KB

        MD5

        4edc18caa06d5eee6693645a38b03578

        SHA1

        5d554f3a3506f6a95672bbee0b052d86f7f3ac51

        SHA256

        d8be56ece9e766db97a09c690372abeda51b6531054b5d1f419196bbeb3219e2

        SHA512

        ce1e06747fcf35745e738822ff7e67ff66c0586b68c9d0bb2c62c0a986a6de9ce69cac2c64dd2d8febd4756c1dd39afe787814bc2bad8bb84e117ba11e00e601

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        127B

        MD5

        2fe9f728d9f035ca09fe147540fb3d00

        SHA1

        496b8e7f7d8c5d44ab375cb15729c013a886226c

        SHA256

        c08afae28daccbd03b02cae1c65a653612e5cbcbab3258fd2ac0370e6afcfa59

        SHA512

        e0c92c5eeaac39568becb599b53dd4ee894677dd9a027b3433f2750e4f94d35015441247d39b247e9c16fdc88d0d43fd79109463ec22179757c3362a34504030

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        246B

        MD5

        5b33ef0c65b95853b8b43fb3da4edd9f

        SHA1

        931adcec1e38330f100f614319b0691ac6a2e9f4

        SHA256

        01b05961ad7bddbcdcf8b1dbd7c93f80f9eb31e30aeca64ab59bed9026f1c11b

        SHA512

        55ee39c347698aa4c1b050724789e86cf98b4aa0cbe532c67bd7652922b218a92df2e3407ae517d9d339f60796ab3e159002343bd7a7fce490c1645909f5794f

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        289B

        MD5

        562a0dd12b3880219f986fb8a6fd0e28

        SHA1

        29d0b952b7ef12460c22db669d681311f5fb6e67

        SHA256

        82b048f6ca60d4aa28b95901e8f415e92771e5d13d2464fd993ae6f2bbe9cadc

        SHA512

        d1e1f5cfb04ea394db7db9b6d733529a5a3dc4462d348322307854d4512002cda09a2bd7e2c7497758bbb992cb8922bcb600bb1bf52d8a4a59e6cb021d988815

      • C:\Windows\SysWOW64\scsimon.dll

        Filesize

        137KB

        MD5

        fc65247cc097a0695cf3039882c3e6d7

        SHA1

        1175341d77b98e3a21a8e3d3f2812cb1ba360380

        SHA256

        340a7428aaba67e0ba069f71effff3ad18ae493eccc231d8dfbc0dcad37cff4c

        SHA512

        efd812eb0f9af2b3c3f631d47aed147310013cadabdcb2ba963119ac6a6c96377cd01bb1a303c0e212dd6257c91ef11884fc7afbd310ea759da96af4a8b8cc6c

      • memory/960-4-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/960-14-0x00000000025F0000-0x000000000260D000-memory.dmp

        Filesize

        116KB

      • memory/960-11-0x00000000025F0000-0x000000000260D000-memory.dmp

        Filesize

        116KB

      • memory/960-8-0x00000000025F0000-0x000000000260D000-memory.dmp

        Filesize

        116KB

      • memory/960-9-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/960-13-0x00000000025F0000-0x000000000260D000-memory.dmp

        Filesize

        116KB

      • memory/960-12-0x00000000025F0000-0x000000000260D000-memory.dmp

        Filesize

        116KB

      • memory/960-5-0x00000000025F0000-0x000000000260D000-memory.dmp

        Filesize

        116KB

      • memory/960-42-0x0000000043E50000-0x0000000043E77000-memory.dmp

        Filesize

        156KB

      • memory/960-39-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/4884-16-0x0000000000AA0000-0x0000000000AC7000-memory.dmp

        Filesize

        156KB

      • memory/4884-27-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB

      • memory/4884-26-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB

      • memory/4884-29-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB

      • memory/4884-28-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB

      • memory/4884-23-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB

      • memory/4884-43-0x0000000000AA0000-0x0000000000AC7000-memory.dmp

        Filesize

        156KB

      • memory/4884-24-0x0000000002E20000-0x0000000002E3D000-memory.dmp

        Filesize

        116KB

      • memory/4884-17-0x0000000000AA0000-0x0000000000AC7000-memory.dmp

        Filesize

        156KB

      • memory/4884-15-0x0000000000A10000-0x0000000000A33000-memory.dmp

        Filesize

        140KB