Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 20:29

General

  • Target

    d2b47eb0814d77126e096f172b341603cf591670710e69c7b6641bfb4873b669.dll

  • Size

    137KB

  • MD5

    7e4d9f6fffa4c46c8b35b7151537e6c0

  • SHA1

    8d8962a62cf3152a3a2a4b14db5a7616e89b793b

  • SHA256

    d2b47eb0814d77126e096f172b341603cf591670710e69c7b6641bfb4873b669

  • SHA512

    34a3ce67b4cacf4e7faf1bedc52a33ccd0243dde4645b7b0f31c3a18d2bbf265efb2661bd3d218c6f14ef20f5c2bd37176cc615afe43ff23660cd97c445eadfc

  • SSDEEP

    3072:lR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuB:o25GgFny61mrav

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 17 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d2b47eb0814d77126e096f172b341603cf591670710e69c7b6641bfb4873b669.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3872
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d2b47eb0814d77126e096f172b341603cf591670710e69c7b6641bfb4873b669.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3600
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 628
        3⤵
        • Program crash
        PID:4412
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2996 -ip 2996
    1⤵
      PID:3508
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
        PID:3512
      • C:\Windows\system32\Spoolsv.exe
        Spoolsv.exe
        1⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:4732

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\AppPatch\ComBack.Dll

        Filesize

        137KB

        MD5

        0af2d3d0a515f0334116ad975ce6924d

        SHA1

        f512e2b63c98a06ba9b4b53465cbe45020e3f2fc

        SHA256

        eda8f3273a665516e6b147d7addf5c9b113ed8f85e1112f2fd5857ee7755c4b3

        SHA512

        b000093f0f338f25721f763745e7c6cbc86193117309af44d13de7a9af76e0510ebd19831bfdb781aac73adbd0436f9a8e9552b706fc70aaec0155e31c0d8889

      • C:\Windows\SysWOW64\Miscson.dll

        Filesize

        137KB

        MD5

        4d6c1491fb3755cae34d6c1f5166ad28

        SHA1

        fd5b9c05288f6d915c28e7202b305f612b4c6eb3

        SHA256

        48fb38ec24e6b755eeb01abc00a45b283d01cd6fa3949eb20c211da8964959a8

        SHA512

        34e30e085883c43d3cb30e77ae26562af571156a939f7bf5c510dcc7a843e9e48b262dff2fec4c6a39511f39528c8bd7d18366b8245949f7d7cb4c3d1384e96f

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        128B

        MD5

        f2db7eb513cb3165ffc95133ee535c10

        SHA1

        22665a56cfb3eb07d31a72002b596f9249087b1f

        SHA256

        d6961c1d979d6248e4556af1f3e5fc9aa1741058dd04225ac72c5ade99d8598f

        SHA512

        e54cb31b1e2cd576bc5108af565eb6e119b515495960f69bb73aee713f722591815f887f5af0809e7ad4b97add64ca8cfac7e45585407664bd0f8da75fdc8b77

      • C:\Windows\SysWOW64\scsimon.dll

        Filesize

        137KB

        MD5

        188f87939234d6fec4b6e57a64c788c7

        SHA1

        2779bb305d50b8cf63126a96455957b715d6ade1

        SHA256

        aafbbf77199ed85aaae8f843c3dc0a0e32a91a820e3608614eb1c50dace41cdf

        SHA512

        c00a702dd60654b80c4640da229e1be5f862055cfff25849d76b05bf3c26acf549a8b432749cbce3eb4d1b20490cd50e53363fb2a41bc88036a5b057d3bee355

      • memory/2996-13-0x0000000002320000-0x000000000233D000-memory.dmp

        Filesize

        116KB

      • memory/2996-12-0x0000000002320000-0x000000000233D000-memory.dmp

        Filesize

        116KB

      • memory/2996-40-0x0000000002320000-0x000000000233D000-memory.dmp

        Filesize

        116KB

      • memory/2996-18-0x0000000002320000-0x000000000233D000-memory.dmp

        Filesize

        116KB

      • memory/2996-5-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/2996-7-0x0000000002320000-0x000000000233D000-memory.dmp

        Filesize

        116KB

      • memory/2996-17-0x0000000002320000-0x000000000233D000-memory.dmp

        Filesize

        116KB

      • memory/2996-42-0x0000000043E50000-0x0000000043E77000-memory.dmp

        Filesize

        156KB

      • memory/2996-6-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/2996-39-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/2996-10-0x0000000002320000-0x000000000233D000-memory.dmp

        Filesize

        116KB

      • memory/3600-25-0x00000000028D0000-0x00000000028ED000-memory.dmp

        Filesize

        116KB

      • memory/3600-28-0x00000000028D0000-0x00000000028ED000-memory.dmp

        Filesize

        116KB

      • memory/3600-32-0x0000000000A80000-0x0000000000AA7000-memory.dmp

        Filesize

        156KB

      • memory/3600-26-0x00000000028D0000-0x00000000028ED000-memory.dmp

        Filesize

        116KB

      • memory/3600-29-0x00000000028D0000-0x00000000028ED000-memory.dmp

        Filesize

        116KB

      • memory/3600-31-0x00000000028D0000-0x00000000028ED000-memory.dmp

        Filesize

        116KB

      • memory/3600-30-0x00000000028D0000-0x00000000028ED000-memory.dmp

        Filesize

        116KB

      • memory/3600-22-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3600-14-0x0000000000A80000-0x0000000000AA7000-memory.dmp

        Filesize

        156KB

      • memory/3600-16-0x0000000000A80000-0x0000000000AA7000-memory.dmp

        Filesize

        156KB

      • memory/3600-15-0x00000000004D0000-0x00000000004F3000-memory.dmp

        Filesize

        140KB