Analysis

  • max time kernel
    134s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 12:08

General

  • Target

    d5dc338bfde9301b5ec4485a79a352518fb4d3b999b7ec4d1ccc2d928cc8d814.dll

  • Size

    137KB

  • MD5

    435793af70394b8b058af627ff789662

  • SHA1

    0c90b30618e4d8719498ec51d894c71a95e69d71

  • SHA256

    d5dc338bfde9301b5ec4485a79a352518fb4d3b999b7ec4d1ccc2d928cc8d814

  • SHA512

    9e98eb47221b8ffb3aa143bba1b2f17272a3c3813c864ffee1d5c66913fd9980e4a7b930e999b28a5800efced5e20cf70bb584971858c9dc8ce823c910126667

  • SSDEEP

    3072:GR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu1:j25GgFny61mraD

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 17 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d5dc338bfde9301b5ec4485a79a352518fb4d3b999b7ec4d1ccc2d928cc8d814.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d5dc338bfde9301b5ec4485a79a352518fb4d3b999b7ec4d1ccc2d928cc8d814.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1212
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 688
        3⤵
        • Program crash
        PID:736
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4856 -ip 4856
    1⤵
      PID:4792
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
        PID:2732
      • C:\Windows\system32\Spoolsv.exe
        Spoolsv.exe
        1⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:3604

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\AppPatch\ComBack.Dll

        Filesize

        137KB

        MD5

        8f0b94e11350a67b9cc1997f73da2ade

        SHA1

        8238927165abb6ca3cd5fda8f4baa06ca8b811a2

        SHA256

        3b60c18d006f16313320f0801b9ec0d3977d6f29c172315eedfb377ec218a115

        SHA512

        6a283b16eddc0ed4515f29c44125b0dae4b2cdf54888f2235519b2202b340ef98fa811a90df5486a62f3a7ca15136c68be5589b61fa0abb9ac4dc15052bba088

      • C:\Windows\SysWOW64\Miscson.dll

        Filesize

        137KB

        MD5

        455924f83f987c4fffd9916b3eda82e3

        SHA1

        594b736b8817638488beb7890b7c1f322096a6cf

        SHA256

        ea0990838466373673b1f5aa0ee027ffcea3f1c4f3d474e71da156a6e4f4f595

        SHA512

        85174717e22c0c467f016714dd39baa07275e5f067dd225ba76b7768fb0e2ffd795fdea018b6b316bbf14540c59cbaa642f2b15951e6fd3ace019eebcbfd331b

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        128B

        MD5

        43db8c314b948a3584bbd8a259eb51ec

        SHA1

        b37166435fea6434a4e560cc97ac31fbbf7834cc

        SHA256

        b3e96ad4a835bb2314a791f8e4bbd775f34eaadfc8e07e693e7edde91c4d5cb3

        SHA512

        f58f2415e915b9833e033747d7d424e43d747d594f028763d180e86083a4edea721278eabcec0fa0ce2824c70d4bfa353cbac87b3ce1734ee80306a760b5d96f

      • C:\Windows\SysWOW64\scsimon.dll

        Filesize

        137KB

        MD5

        a8c164d913c8a3f659ae85a2e2756db2

        SHA1

        6340371fbaad3c6f6ec7db6bee1e9caf345fa6c4

        SHA256

        5c1daa0ed8c120f2480c308d3a8d93f47d546be3037aefbaa65658dbfa593584

        SHA512

        3ee858e4e84a67f13d03aacf4e872855937ee367d26b0b11af94eecf673fa0cd067b91934cc76a980ff786656e08aaaa006992d42fa0bd0a24f36101977cd6b8

      • memory/1212-26-0x0000000002EC0000-0x0000000002EDD000-memory.dmp

        Filesize

        116KB

      • memory/1212-30-0x0000000002EC0000-0x0000000002EDD000-memory.dmp

        Filesize

        116KB

      • memory/1212-42-0x0000000000C40000-0x0000000000C67000-memory.dmp

        Filesize

        156KB

      • memory/1212-15-0x0000000000C40000-0x0000000000C67000-memory.dmp

        Filesize

        156KB

      • memory/1212-25-0x0000000002EC0000-0x0000000002EDD000-memory.dmp

        Filesize

        116KB

      • memory/1212-28-0x0000000002EC0000-0x0000000002EDD000-memory.dmp

        Filesize

        116KB

      • memory/1212-18-0x0000000000C40000-0x0000000000C67000-memory.dmp

        Filesize

        156KB

      • memory/1212-17-0x0000000000AA0000-0x0000000000AC3000-memory.dmp

        Filesize

        140KB

      • memory/1212-31-0x0000000002EC0000-0x0000000002EDD000-memory.dmp

        Filesize

        116KB

      • memory/1212-22-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/1212-29-0x0000000002EC0000-0x0000000002EDD000-memory.dmp

        Filesize

        116KB

      • memory/4856-10-0x00000000011D0000-0x00000000011ED000-memory.dmp

        Filesize

        116KB

      • memory/4856-13-0x00000000011D0000-0x00000000011ED000-memory.dmp

        Filesize

        116KB

      • memory/4856-6-0x00000000011D0000-0x00000000011ED000-memory.dmp

        Filesize

        116KB

      • memory/4856-5-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/4856-12-0x00000000011D0000-0x00000000011ED000-memory.dmp

        Filesize

        116KB

      • memory/4856-39-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/4856-38-0x00000000011D0000-0x00000000011ED000-memory.dmp

        Filesize

        116KB

      • memory/4856-41-0x0000000043E50000-0x0000000043E77000-memory.dmp

        Filesize

        156KB

      • memory/4856-16-0x00000000011D0000-0x00000000011ED000-memory.dmp

        Filesize

        116KB

      • memory/4856-14-0x00000000011D0000-0x00000000011ED000-memory.dmp

        Filesize

        116KB

      • memory/4856-7-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB