Analysis

  • max time kernel
    135s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 11:47

General

  • Target

    afa232bb2879f2fa97358cbb3473509ed3209b465c916b12b3f6a179e4399420.dll

  • Size

    137KB

  • MD5

    6422660d4a8bfa9a33ae1dfc99a4d634

  • SHA1

    940a5afff585791164534c9100a87941fa4515f5

  • SHA256

    afa232bb2879f2fa97358cbb3473509ed3209b465c916b12b3f6a179e4399420

  • SHA512

    96449a6891a0abe837a72aa79630f7d03a84d715f3ec45e07aa9be021a6a745a3501461ddde793ae3c731ef82647148d31c014e8f29c371d9357005faa08f934

  • SSDEEP

    3072:lR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:o25GgFny61mra

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 15 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\afa232bb2879f2fa97358cbb3473509ed3209b465c916b12b3f6a179e4399420.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\afa232bb2879f2fa97358cbb3473509ed3209b465c916b12b3f6a179e4399420.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3524
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 620
        3⤵
        • Program crash
        PID:3840
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4436 -ip 4436
    1⤵
      PID:2560
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
        PID:5020
      • C:\Windows\system32\Spoolsv.exe
        Spoolsv.exe
        1⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:3584

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\AppPatch\ComBack.Dll

        Filesize

        137KB

        MD5

        507a6b3eef55a39ab3f3ed57d5f0381c

        SHA1

        ef1254c61b15414e5f2854b441608e23e84371f5

        SHA256

        0c68e4ffd92bc375c0806f4ff1074a07994b844b6e4b5f859642d712cb0468d7

        SHA512

        8a1bc52c630030955825b90a288da0bba5f51ad822c0c3198274c80c63bb468188ead85d56224c888e6aede53f6aae877533ffe770a9ac168049a1a740672201

      • C:\Windows\SysWOW64\Miscson.dll

        Filesize

        137KB

        MD5

        e08a895e02016797c374677b25a8e83f

        SHA1

        60bddf8c651374f105538f65e1ff45b90abd1e81

        SHA256

        c12c0ca109d6329d28c35395eba95587860eb6bd2b93e9991454976ca7853c18

        SHA512

        4c9bd1b83b1c66d82e0522a93e50eee4c74dc1ec248113a6ed278266d15c57a799d102274fa207923f6d149c5c7f6cf0d8e07070aaceeb10fc43ffc6621051e0

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        128B

        MD5

        ce4f99fa85b563c6a7e172796ef48815

        SHA1

        a1c59031058c82741d59fea26f06ed009950a465

        SHA256

        de727704afaea27185ebce11f2dced0652ac75fddaaa4525254ac4f37017a943

        SHA512

        c66de19fd0b85e2767ada8ebfbd2719ac71770653a546a4927fcfd57376c628cdb46a29e7e51a02215c8148de34304ab5c6f0835ce2d8a6c79cdae1b43d909b2

      • C:\Windows\SysWOW64\scsimon.dll

        Filesize

        137KB

        MD5

        b874b9e6fe6bcb09080aaa9feab48b51

        SHA1

        5b4b9ca0cb0316a52827c50486a7e46813e05aec

        SHA256

        a9b8c4485f11983dab6701928c92d334ebdfdf8ef009cc261d028413fb78bb12

        SHA512

        72ba0e9026be6ecef05d37ed6b0529abf0ae83cabacde0218b87f67b2686abca2a59c9bf3dbd14d73daeed35c97d8f73d6ad840c924e269187703dae0896fb0f

      • memory/3524-25-0x00000000009D0000-0x00000000009F7000-memory.dmp

        Filesize

        156KB

      • memory/3524-29-0x0000000002C70000-0x0000000002C8D000-memory.dmp

        Filesize

        116KB

      • memory/3524-17-0x0000000000870000-0x0000000000893000-memory.dmp

        Filesize

        140KB

      • memory/3524-28-0x0000000002C70000-0x0000000002C8D000-memory.dmp

        Filesize

        116KB

      • memory/3524-18-0x00000000009D0000-0x00000000009F7000-memory.dmp

        Filesize

        156KB

      • memory/3524-31-0x0000000002C70000-0x0000000002C8D000-memory.dmp

        Filesize

        116KB

      • memory/3524-15-0x00000000009D0000-0x00000000009F7000-memory.dmp

        Filesize

        156KB

      • memory/3524-30-0x0000000002C70000-0x0000000002C8D000-memory.dmp

        Filesize

        116KB

      • memory/3524-26-0x0000000002C70000-0x0000000002C8D000-memory.dmp

        Filesize

        116KB

      • memory/3524-24-0x0000000002C70000-0x0000000002C8D000-memory.dmp

        Filesize

        116KB

      • memory/4436-10-0x0000000002D40000-0x0000000002D5D000-memory.dmp

        Filesize

        116KB

      • memory/4436-16-0x0000000002D40000-0x0000000002D5D000-memory.dmp

        Filesize

        116KB

      • memory/4436-7-0x0000000002D40000-0x0000000002D5D000-memory.dmp

        Filesize

        116KB

      • memory/4436-12-0x0000000002D40000-0x0000000002D5D000-memory.dmp

        Filesize

        116KB

      • memory/4436-5-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/4436-13-0x0000000002D40000-0x0000000002D5D000-memory.dmp

        Filesize

        116KB

      • memory/4436-41-0x0000000043E50000-0x0000000043E77000-memory.dmp

        Filesize

        156KB

      • memory/4436-42-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/4436-14-0x0000000002D40000-0x0000000002D5D000-memory.dmp

        Filesize

        116KB

      • memory/4436-6-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB