Analysis

  • max time kernel
    134s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 01:49

General

  • Target

    52d73c185a08cafda0aa18a695ca7a53ddd6747ccaf4a7f935b042621ba929d2.dll

  • Size

    137KB

  • MD5

    47e6587b4000f64e4bc5c82dba758aef

  • SHA1

    84c7f93a4cfef424315175f95c76980c6cd55251

  • SHA256

    52d73c185a08cafda0aa18a695ca7a53ddd6747ccaf4a7f935b042621ba929d2

  • SHA512

    948e84cd28eea35fbc102228bb3a1dc22440af0326f77185610c4b22e2b024ec086bf3754ea66c89938d6a33599b0608d5e5821c4bad6602539dd0ee4693d995

  • SSDEEP

    3072:OR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:b25GgFny61mraY

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 17 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\52d73c185a08cafda0aa18a695ca7a53ddd6747ccaf4a7f935b042621ba929d2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\52d73c185a08cafda0aa18a695ca7a53ddd6747ccaf4a7f935b042621ba929d2.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4332
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 616
        3⤵
        • Program crash
        PID:3136
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4332 -ip 4332
    1⤵
      PID:452
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
      • Boot or Logon Autostart Execution: Port Monitors
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:1968

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\AppPatch\ComBack.Dll

      Filesize

      137KB

      MD5

      1d47c3c658a5d01fac00faf81f9ebedb

      SHA1

      1610bf25855fad49c8494c140d586a024b20111a

      SHA256

      2bb43e1178c85d159ab8b40a3c7e3a82d7c0210c6b1eab8feb79f57095af902e

      SHA512

      b10eb1cf309a7a66ad441a070a8be8fe52ca8ab734669f3dcf4c6d2949bdd0677567c3c0e7ee8e2b56fd08afb69a03a6369ee219d8f5f158ab30b7e638c6c63a

    • C:\Windows\SysWOW64\com\comb.dll

      Filesize

      128B

      MD5

      039e7ac4de587ee5e71c8f83d142b1a6

      SHA1

      8b71749cd198d413304c566d6d16b2bea204db3f

      SHA256

      c269893be4004447ff6a90732db49882b11ae893b1f06095c5548ad5721a5381

      SHA512

      a8d538e4558b2d780d6dde7b68f4142ee22fb495781a77915eb3c5041d29200d16e697798e5348e90cd6e258d8267dc2bb0185c872ccf7edb4f085e53913ddb1

    • memory/4112-29-0x0000000003520000-0x000000000353D000-memory.dmp

      Filesize

      116KB

    • memory/4112-18-0x00000000016D0000-0x00000000016F7000-memory.dmp

      Filesize

      156KB

    • memory/4112-32-0x00000000016D0000-0x00000000016F7000-memory.dmp

      Filesize

      156KB

    • memory/4112-26-0x0000000003520000-0x000000000353D000-memory.dmp

      Filesize

      116KB

    • memory/4112-28-0x0000000003520000-0x000000000353D000-memory.dmp

      Filesize

      116KB

    • memory/4112-31-0x0000000003520000-0x000000000353D000-memory.dmp

      Filesize

      116KB

    • memory/4112-30-0x0000000003520000-0x000000000353D000-memory.dmp

      Filesize

      116KB

    • memory/4112-16-0x0000000000F20000-0x0000000000F43000-memory.dmp

      Filesize

      140KB

    • memory/4112-17-0x00000000016D0000-0x00000000016F7000-memory.dmp

      Filesize

      156KB

    • memory/4112-23-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4112-25-0x0000000003520000-0x000000000353D000-memory.dmp

      Filesize

      116KB

    • memory/4332-4-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4332-6-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4332-7-0x00000000022F0000-0x000000000230D000-memory.dmp

      Filesize

      116KB

    • memory/4332-10-0x00000000022F0000-0x000000000230D000-memory.dmp

      Filesize

      116KB

    • memory/4332-12-0x00000000022F0000-0x000000000230D000-memory.dmp

      Filesize

      116KB

    • memory/4332-5-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4332-13-0x00000000022F0000-0x000000000230D000-memory.dmp

      Filesize

      116KB

    • memory/4332-15-0x00000000022F0000-0x000000000230D000-memory.dmp

      Filesize

      116KB

    • memory/4332-14-0x00000000022F0000-0x000000000230D000-memory.dmp

      Filesize

      116KB

    • memory/4332-34-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4332-36-0x0000000043E50000-0x0000000043E77000-memory.dmp

      Filesize

      156KB