File name:

3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe

Full analysis: https://app.any.run/tasks/09219928-e9ff-4397-af33-b4dd906dcd63
Verdict: Malicious activity
Threats:

Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.

Analysis date: August 01, 2025, 06:06:52
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
gh0st
rat
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

74F117CD92DDCCD5777461C7FD8CA150

SHA1:

1291BFBA35B9573F9FE418FFE6CD9CAA6BAB003B

SHA256:

3508C0194A801A2C6DFA045FFD06D3497623E4FD6BDD5E83DAEBFCD1262D610A

SSDEEP:

49152:TJ6/C6ZCvN7z88988NtMJ+HyH9bv4Y6BBBBBD2CPc/oouuEsoGc7BWVMtwkaCg91:l6/C6ZM6+y9v4o/EgZSQSh54F

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GH0ST mutex has been found

      • 3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe (PID: 2492)
      • svchcst.exe (PID: 7080)
      • svchcst.exe (PID: 2728)
      • svchcst.exe (PID: 2428)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 7076)
      • wscript.exe (PID: 3488)
      • wscript.exe (PID: 5236)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe (PID: 2492)
      • svchcst.exe (PID: 7080)
    • Reads security settings of Internet Explorer

      • 3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe (PID: 2492)
      • svchcst.exe (PID: 7080)
    • The process executes VB scripts

      • 3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe (PID: 2492)
      • svchcst.exe (PID: 7080)
    • Accesses WMI object, sets custom ImpersonationLevel (SCRIPT)

      • wscript.exe (PID: 7076)
      • wscript.exe (PID: 5236)
      • wscript.exe (PID: 3488)
    • Executes WMI query (SCRIPT)

      • wscript.exe (PID: 7076)
      • wscript.exe (PID: 5236)
      • wscript.exe (PID: 3488)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 7076)
      • wscript.exe (PID: 5236)
      • wscript.exe (PID: 3488)
  • INFO

    • Reads the computer name

      • 3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe (PID: 2492)
      • svchcst.exe (PID: 7080)
    • Checks supported languages

      • 3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe (PID: 2492)
      • svchcst.exe (PID: 7080)
      • svchcst.exe (PID: 2728)
      • svchcst.exe (PID: 2428)
    • Process checks computer location settings

      • 3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe (PID: 2492)
      • svchcst.exe (PID: 7080)
    • Creates files or folders in the user directory

      • 3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe (PID: 2492)
      • svchcst.exe (PID: 7080)
    • Checks proxy server information

      • slui.exe (PID: 4024)
    • Reads the software policy settings

      • slui.exe (PID: 4024)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (35.8)
.exe | Win64 Executable (generic) (31.7)
.scr | Windows screen saver (15)
.dll | Win32 Dynamic Link Library (generic) (7.5)
.exe | Win32 Executable (generic) (5.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:12:26 00:25:29+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 57344
InitializedDataSize: 512000
UninitializedDataSize: -
EntryPoint: 0xb2656
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
8
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GH0ST 3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe wscript.exe no specs #GH0ST svchcst.exe wscript.exe no specs wscript.exe no specs #GH0ST svchcst.exe no specs #GH0ST svchcst.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
2428"C:\Users\admin\AppData\Roaming\Microsoft\svchcst.exe" C:\Users\admin\AppData\Roaming\Microsoft\svchcst.exe
wscript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\microsoft\svchcst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ws2_32.dll
c:\windows\syswow64\rpcrt4.dll
2492"C:\Users\admin\Desktop\3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe" C:\Users\admin\Desktop\3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\desktop\3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
2728"C:\Users\admin\AppData\Roaming\Microsoft\svchcst.exe" C:\Users\admin\AppData\Roaming\Microsoft\svchcst.exe
wscript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\microsoft\svchcst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ws2_32.dll
c:\windows\syswow64\rpcrt4.dll
3488"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\Microsoft\VBS3.vbs" C:\Windows\SysWOW64\wscript.exesvchcst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
4024C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5236"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\Microsoft\VBS3.vbs" C:\Windows\SysWOW64\wscript.exesvchcst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
7076"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\Microsoft\VBS3.vbs" C:\Windows\SysWOW64\wscript.exe3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7080"C:\Users\admin\AppData\Roaming\Microsoft\svchcst.exe" C:\Users\admin\AppData\Roaming\Microsoft\svchcst.exe
wscript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\users\admin\appdata\roaming\microsoft\svchcst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
Total events
11 629
Read events
11 622
Write events
7
Delete events
0

Modification events

(PID) Process:(2492) 3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
Operation:writeName:LastUpdate
Value:
88598C6800000000
(PID) Process:(2492) 3508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(7076) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(7080) svchcst.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(3488) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(5236) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
Executable files
4
Suspicious files
0
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
24923508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exeC:\Users\admin\AppData\Roaming\svchcst.exeexecutable
MD5:74F117CD92DDCCD5777461C7FD8CA150
SHA256:3508C0194A801A2C6DFA045FFD06D3497623E4FD6BDD5E83DAEBFCD1262D610A
24923508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exeC:\Users\admin\AppData\Roaming\Microsoft\VBS3.vbstext
MD5:B778ECA3598528A01D24AADD37CBB5D5
SHA256:54A84F5420D1F39A06BC5F9818EAB34021B1B4D88F5C9CDCBB49F36C8A670FF9
7080svchcst.exeC:\Users\admin\AppData\Roaming\Microsoft\VBS3.vbstext
MD5:28C660A51A118C6EDB76C1B98D26EF5C
SHA256:84A65F79036F273F08F85F6A6D7B1EA71811DCA8916BF65AB1272A3571B68C3B
24923508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exeC:\Users\admin\AppData\Roaming\Microsoft\Config.initext
MD5:67B9B3E2DED7086F393EBBC36C5E7BCA
SHA256:44063C266686263F14CD2A83FEE124FB3E61A9171A6AAB69709464F49511011D
7080svchcst.exeC:\Users\admin\AppData\Roaming\svchcst.exeexecutable
MD5:DB3ACA52640B3F0123F7CC9AF0C32D32
SHA256:7FA5A89EFBC36DF43C02EA02240C3E488A1DF3E41914E0CA3A38C44BC71864BE
7080svchcst.exeC:\Users\admin\AppData\Roaming\Microsoft\svchcst.exeexecutable
MD5:8493BAD2BFE8D801889B2BC35386B2B2
SHA256:EBDDF3BDA55F6B559F6BFCD9BE8EFAC71A4053AE469521DAA57354289EF98829
24923508c0194a801a2c6dfa045ffd06d3497623e4fd6bdd5e83daebfcd1262d610a.exeC:\Users\admin\AppData\Roaming\Microsoft\svchcst.exeexecutable
MD5:DB3ACA52640B3F0123F7CC9AF0C32D32
SHA256:7FA5A89EFBC36DF43C02EA02240C3E488A1DF3E41914E0CA3A38C44BC71864BE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
19
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
23.216.77.20:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6388
RUXIMICS.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6388
RUXIMICS.exe
GET
200
23.216.77.20:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6388
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
52.167.17.97:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5944
MoUsoCoreWorker.exe
23.216.77.20:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6388
RUXIMICS.exe
23.216.77.20:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6388
RUXIMICS.exe
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 52.167.17.97
whitelisted
google.com
  • 142.250.74.206
whitelisted
crl.microsoft.com
  • 23.216.77.20
  • 23.216.77.28
  • 23.216.77.25
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
self.events.data.microsoft.com
  • 20.42.73.25
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info