Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 12:52

General

  • Target

    b5f7ee792e4f392e0b0c9c81ba611a8f8d5113e94a4c6817c88732b930ad125a.dll

  • Size

    137KB

  • MD5

    81900cd819492780dc690684861baad8

  • SHA1

    9847e82c0d4e62af4ff39b80ffda5e232d7156fb

  • SHA256

    b5f7ee792e4f392e0b0c9c81ba611a8f8d5113e94a4c6817c88732b930ad125a

  • SHA512

    ec2134711b9f7c77d04c972a557a5a448df6d97a8d97bf35f573b49593619b32bb0989e1151f89b5188e7eb5509bd784ec6feadf0d9b75775c56f00f2cfdc7fd

  • SSDEEP

    3072:0R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuT:x25GgFny61mra9

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 16 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b5f7ee792e4f392e0b0c9c81ba611a8f8d5113e94a4c6817c88732b930ad125a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b5f7ee792e4f392e0b0c9c81ba611a8f8d5113e94a4c6817c88732b930ad125a.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4352
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3096
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 616
        3⤵
        • Program crash
        PID:4444
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4352 -ip 4352
    1⤵
      PID:4108
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
      • Boot or Logon Autostart Execution: Port Monitors
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:1268

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\AppPatch\ComBack.Dll

      Filesize

      137KB

      MD5

      3fbd0a5ff778c53269fc622d778214be

      SHA1

      e3d0fd3ec7c38efdbf2e167a5645ad16db7b5cc2

      SHA256

      1866ae88c2c2086ed09a44a2c95f8d41527aa6cbb6f1b84f77bc944e6b4690d5

      SHA512

      e12675b9ebdd1ec6313d779f95c805af726c8384d56bf67fed8199fba1f4061c426a7ac2d34305db7e44259ee75f7dd53f6d48763df9e1acac9c7b937e991436

    • C:\Windows\SysWOW64\com\comb.dll

      Filesize

      128B

      MD5

      53616ddb0185847265bc65551a51ec8a

      SHA1

      de18a02aaa7469d9eb0c5dea22ad19af29e241f5

      SHA256

      10db61114765e7bbd26266c6494d58cf8c84df9257e4557d30523e315c1e014a

      SHA512

      9721d02a25b42c99e88d9f86fe47e06ceecc4924fc38a1ceccf05fee773941819cb8e30d3396d083115b69f4e44bfd94a78c391b2da250c6b8b44871b34b8e8f

    • memory/3096-36-0x0000000001880000-0x00000000018A7000-memory.dmp

      Filesize

      156KB

    • memory/3096-27-0x00000000036C0000-0x00000000036DD000-memory.dmp

      Filesize

      116KB

    • memory/3096-28-0x00000000036C0000-0x00000000036DD000-memory.dmp

      Filesize

      116KB

    • memory/3096-30-0x00000000036C0000-0x00000000036DD000-memory.dmp

      Filesize

      116KB

    • memory/3096-18-0x0000000001880000-0x00000000018A7000-memory.dmp

      Filesize

      156KB

    • memory/3096-17-0x00000000012C0000-0x00000000012E3000-memory.dmp

      Filesize

      140KB

    • memory/3096-29-0x00000000036C0000-0x00000000036DD000-memory.dmp

      Filesize

      116KB

    • memory/3096-14-0x0000000001880000-0x00000000018A7000-memory.dmp

      Filesize

      156KB

    • memory/3096-24-0x00000000036C0000-0x00000000036DD000-memory.dmp

      Filesize

      116KB

    • memory/3096-25-0x00000000036C0000-0x00000000036DD000-memory.dmp

      Filesize

      116KB

    • memory/4352-15-0x0000000002390000-0x00000000023AD000-memory.dmp

      Filesize

      116KB

    • memory/4352-7-0x0000000002390000-0x00000000023AD000-memory.dmp

      Filesize

      116KB

    • memory/4352-13-0x0000000002390000-0x00000000023AD000-memory.dmp

      Filesize

      116KB

    • memory/4352-16-0x0000000002390000-0x00000000023AD000-memory.dmp

      Filesize

      116KB

    • memory/4352-4-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4352-12-0x0000000002390000-0x00000000023AD000-memory.dmp

      Filesize

      116KB

    • memory/4352-10-0x0000000002390000-0x00000000023AD000-memory.dmp

      Filesize

      116KB

    • memory/4352-6-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4352-35-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB

    • memory/4352-34-0x0000000043E50000-0x0000000043E77000-memory.dmp

      Filesize

      156KB

    • memory/4352-5-0x0000000010000000-0x000000001001C000-memory.dmp

      Filesize

      112KB