File name:

1 (1378)

Full analysis: https://app.any.run/tasks/b165a104-e2a3-4340-ab22-8e43d5a4db49
Verdict: Malicious activity
Threats:

Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.

Analysis date: March 24, 2025, 15:37:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
gh0st
rat
delphi
rdp
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

CA232200C58619822A082497526BF6B0

SHA1:

682417876F4716253CD8337E2A71FFD0EA8B3B5A

SHA256:

165B4B20C62A8FC6B6BECB8FC05091FBE53F8982114D664A84A67978A54F6139

SSDEEP:

3072:tnUFKt3AoncEpr1sYfQot/ImihzIYY5BV9UCuvAXBYIMkuBbtplkPWzYlbpza5ch:eFwf3oo5ImihMrfVFuvYYIMWza4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • svchost.exe (PID: 6392)
      • rundll32.exe (PID: 7152)
    • GH0ST mutex has been found

      • svchost.exe (PID: 6392)
      • rundll32.exe (PID: 7152)
  • SUSPICIOUS

    • Executes application which crashes

      • rundll32.exe (PID: 7152)
    • Creates file in the systems drive root

      • svchost.exe (PID: 6392)
      • rundll32.exe (PID: 7152)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 7152)
    • Connects to unusual port

      • rundll32.exe (PID: 7152)
      • svchost.exe (PID: 6392)
    • There is functionality for enable RDP (YARA)

      • svchost.exe (PID: 6392)
    • Runs shell command (SCRIPT)

      • mshta.exe (PID: 7408)
  • INFO

    • Autorun file from Startup directory

      • svchost.exe (PID: 6392)
      • rundll32.exe (PID: 7152)
    • Creates files or folders in the user directory

      • rundll32.exe (PID: 7152)
      • WerFault.exe (PID: 4756)
    • Compiled with Borland Delphi (YARA)

      • svchost.exe (PID: 6392)
    • Manual execution by a user

      • mshta.exe (PID: 7408)
    • Reads the software policy settings

      • slui.exe (PID: 6036)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, DLL, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 130560
InitializedDataSize: 9216
UninitializedDataSize: -
EntryPoint: 0x20c24
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #GH0ST rundll32.exe #GH0ST svchost.exe werfault.exe no specs sppextcomobj.exe no specs slui.exe mshta.exe no specs rundll32.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4756C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7152 -s 688C:\Windows\SysWOW64\WerFault.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
5544C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6036"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6392C:\WINDOWS\system32\svchost.exe -k rundll32C:\Windows\SysWOW64\svchost.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\sechost.dll
c:\windows\syswow64\rpcrt4.dll
7152"C:\WINDOWS\SysWOW64\rundll32.exe" "C:\Users\admin\AppData\Local\Temp\1 (1378).dll", #1C:\Windows\SysWOW64\rundll32.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
3221225477
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
7408"C:\Windows\SysWOW64\mshta.exe" "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}C:\Windows\SysWOW64\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
7476"C:\Windows\System32\rundll32.exe" "" InstallC:\Windows\SysWOW64\rundll32.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
7884C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 519
Read events
3 516
Write events
3
Delete events
0

Modification events

(PID) Process:(7408) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7408) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7408) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
2
Suspicious files
3
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
4756WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_8b96a266d05a3f926744fb2133f041e775accbd3_67c333ae_0280925c-3784-429f-b485-f3548240b295\Report.wer
MD5:
SHA256:
7152rundll32.exeC:\Temp\AppPatch\ComBack.Dllexecutable
MD5:40B4CCE14A40E05EEA5040BB8D10616F
SHA256:4255D9232B7A26311DD6B6AD88C59851B206421F45D151A26A67F99FC08AC0BD
7152rundll32.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.htahtml
MD5:16314A598FE98F0CDA7F70B6121CA7AF
SHA256:3B58A824937D323B8A46822F9DD4309BFC7BFD3A72F7D2DAD7CD38CA5E72A60F
6392svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.htahtml
MD5:16314A598FE98F0CDA7F70B6121CA7AF
SHA256:3B58A824937D323B8A46822F9DD4309BFC7BFD3A72F7D2DAD7CD38CA5E72A60F
7152rundll32.exeC:\Windows\Temp\comb.dlltext
MD5:D00AB6B03765AE50127C2357A92C2A4F
SHA256:9BF461DF720806F129AEC98A2D72432700299B03E1D33523C41CF886BF41E958
7152rundll32.exeC:\Temp\AppPatch\comb.dlltext
MD5:D00AB6B03765AE50127C2357A92C2A4F
SHA256:9BF461DF720806F129AEC98A2D72432700299B03E1D33523C41CF886BF41E958
4756WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERBBDF.tmp.dmpbinary
MD5:E9B1FBE063C4D615B6BBE90610D05EDB
SHA256:52715C80A6E4DFF87018002322855B3CAE575B3A75707457D49461D83C93BDD5
4756WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\rundll32.exe.7152.dmpbinary
MD5:699DC7FCC8344CD015BA3A8DD6A24BAB
SHA256:FE5D207C61655D19B35E7A4A469AEDFDF2D7347755507C19A284D4CF8CCFCEBB
4756WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERBD38.tmp.WERInternalMetadata.xmlbinary
MD5:870A9986FD752FBAC888883FE9A74794
SHA256:7612ADC43B3BAEC68127F32EC48A527D96EDD5F553E3AFA0C6CE0E518B53E03C
4756WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERBD87.tmp.xmlxml
MD5:3BAFF446B05B89FDC5FE72D4AFB8EC37
SHA256:73821FE7D5BF94F689DE56A114B8D615190588C737BC5E663C8DDD8A76D96F0B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
27
DNS requests
20
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5072
backgroundTaskHost.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
7612
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7612
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6392
svchost.exe
221.10.93.196:2499
CHINA UNICOM China169 Backbone
CN
unknown
7152
rundll32.exe
221.10.93.196:2499
CHINA UNICOM China169 Backbone
CN
unknown
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6544
svchost.exe
40.126.31.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
23.54.109.203:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5072
backgroundTaskHost.exe
20.223.35.26:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
Guffery.3322.org
whitelisted
client.wns.windows.com
  • 20.197.71.89
  • 40.113.110.67
whitelisted
login.live.com
  • 40.126.31.131
  • 20.190.159.131
  • 40.126.31.129
  • 40.126.31.128
  • 20.190.159.75
  • 20.190.159.71
  • 20.190.159.128
  • 40.126.31.71
whitelisted
ocsp.digicert.com
  • 23.54.109.203
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
Guffery.meibu.com
  • 20.210.205.20
unknown

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET DYN_DNS DYNAMIC_DNS Query to 3322.org Domain
2196
svchost.exe
Misc activity
ET DYN_DNS DYNAMIC_DNS Query to 3322.org Domain
No debug info