Analysis

  • max time kernel
    135s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 23:38

General

  • Target

    ee72ecc0fc25c8e1b5a0d08ca52c70759f13cc1ecf51b8747a75bb01a546b3eb.dll

  • Size

    137KB

  • MD5

    fb375aea89b4e52a2bc8c1fb49618d3b

  • SHA1

    71fc889dae447bbc65918ffad6cb803e5838ef96

  • SHA256

    ee72ecc0fc25c8e1b5a0d08ca52c70759f13cc1ecf51b8747a75bb01a546b3eb

  • SHA512

    91c62ad6f8e16d6f7ff65fdf59604294eb3acbd72513390c5bc7b1f5d5f0df28c16e843d80ba38ceb8c7860fe43d8541fca1f210f1a694d4674a09b2a9ea9783

  • SSDEEP

    3072:XR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu9:q25GgFny61mraP

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 15 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ee72ecc0fc25c8e1b5a0d08ca52c70759f13cc1ecf51b8747a75bb01a546b3eb.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ee72ecc0fc25c8e1b5a0d08ca52c70759f13cc1ecf51b8747a75bb01a546b3eb.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 616
        3⤵
        • Program crash
        PID:3012
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3980 -ip 3980
    1⤵
      PID:1992
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
        PID:2600
      • C:\Windows\system32\Spoolsv.exe
        Spoolsv.exe
        1⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:972

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\AppPatch\ComBack.Dll

        Filesize

        137KB

        MD5

        c92e5ec1735d29bdb330d08729e8076c

        SHA1

        12c1f43c85a400c17d4043e6d1120f3daf731555

        SHA256

        66b1c939f4258f6add6cfd9b72099b8bf50ccc82420106160c8887c827a9e81f

        SHA512

        e11ca7715e813cc276f5e90bc2bbb8c223c85b134963af4c12f9d590c601f09544abf8bf362d048b2f167213e6cedfc2220c06b30be7c3920210834e742be735

      • C:\Windows\SysWOW64\Miscson.dll

        Filesize

        137KB

        MD5

        5c24332853df74470d909e9783b04891

        SHA1

        b14097a84612b9292415d5194f56105d3730d9ab

        SHA256

        addb3ecb90150ae8f58aa85206159244b1526c4a9f0423168c0ca7598b17ae1f

        SHA512

        2b813ea96e29157ea107869a2b30f0e0a0c197922596b827491c7639d864ef610d3be8cb8890fadf5358ff7d8a1360cf07582a76b6a1aeab25200f0a04c57cd7

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        128B

        MD5

        dbe56cb1e25ac31f757d024b94c10579

        SHA1

        516a3de055c7e98e3bbf6f449149907dd87a9d33

        SHA256

        39a0ede0dcc8de90badacb12b9feecab079767bfbbcb9807d44c0f185fd76543

        SHA512

        ce77b7612af732c5fde20b00453deaa41c068e1e70a349b8b4987f39f620abe4088d10e454bf1e5e4f5e57039b6b488e7fde1007c617da25fee708558d929f74

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        247B

        MD5

        b3da0205d691665fc9811340d07f9cff

        SHA1

        83e9c850f11d63a9c4c0c7c5314dc803b2ef9ca9

        SHA256

        d1fbd58bd6c0bc6611374e85d270815cc2c88bd73ba1e4fb9902e588792b7178

        SHA512

        25ae2970979497c53dd1c3b7d33955616ca12f81092f547a23e40e253fe64fcd11e071305c051c6051ec880efc27e376f23be2be6e65ca9d970a0643414ce04f

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        290B

        MD5

        d88240120e8f5438a385a10df186da87

        SHA1

        d54606500071fffe8e626da75eb2bcaa8ac2ced7

        SHA256

        f9a466590e0a1681e4b609b9c3a1b2b4a1d1744619ace3351d96c2b9973b80da

        SHA512

        0468df92fb3bfa5b87db93b83d8526889fb22f4175486f576fe04e3ed197b3b6f2cdf4df049854b53ea6a4acca43a394ed14b073ebf9bbcbf7c756a93ab4faef

      • C:\Windows\SysWOW64\scsimon.dll

        Filesize

        137KB

        MD5

        327fb6565a8d7b829b8843154e01ec96

        SHA1

        b59a596ad5f5711cf735b8bb24b9947e682bca8d

        SHA256

        485454e192e025a2f86e56501b7e5d1fee96561c1355184a731c05e00efd61b2

        SHA512

        ec8ea719555fc12676a9f46f5afe3f353bf4ba9350f28fc1bc6e8973f506ef72413d59608902845983c5d0c581a3ac9ff1850d5a033eef61f08b05c309eb92e1

      • memory/2256-24-0x0000000002AF0000-0x0000000002B0D000-memory.dmp

        Filesize

        116KB

      • memory/2256-16-0x00000000004E0000-0x0000000000503000-memory.dmp

        Filesize

        140KB

      • memory/2256-15-0x0000000000530000-0x0000000000557000-memory.dmp

        Filesize

        156KB

      • memory/2256-17-0x0000000000530000-0x0000000000557000-memory.dmp

        Filesize

        156KB

      • memory/2256-44-0x0000000000530000-0x0000000000557000-memory.dmp

        Filesize

        156KB

      • memory/2256-27-0x0000000002AF0000-0x0000000002B0D000-memory.dmp

        Filesize

        116KB

      • memory/2256-28-0x0000000002AF0000-0x0000000002B0D000-memory.dmp

        Filesize

        116KB

      • memory/2256-25-0x0000000002AF0000-0x0000000002B0D000-memory.dmp

        Filesize

        116KB

      • memory/2256-29-0x0000000002AF0000-0x0000000002B0D000-memory.dmp

        Filesize

        116KB

      • memory/2256-30-0x0000000002AF0000-0x0000000002B0D000-memory.dmp

        Filesize

        116KB

      • memory/3980-8-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3980-10-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3980-5-0x0000000002980000-0x000000000299D000-memory.dmp

        Filesize

        116KB

      • memory/3980-18-0x0000000002980000-0x000000000299D000-memory.dmp

        Filesize

        116KB

      • memory/3980-41-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3980-43-0x0000000043E50000-0x0000000043E77000-memory.dmp

        Filesize

        156KB

      • memory/3980-9-0x0000000002980000-0x000000000299D000-memory.dmp

        Filesize

        116KB

      • memory/3980-12-0x0000000002980000-0x000000000299D000-memory.dmp

        Filesize

        116KB

      • memory/3980-14-0x0000000002980000-0x000000000299D000-memory.dmp

        Filesize

        116KB

      • memory/3980-13-0x0000000002980000-0x000000000299D000-memory.dmp

        Filesize

        116KB