File name:

1 (1155)

Full analysis: https://app.any.run/tasks/50c3b190-c4bd-4a54-8b39-0ee0a625b290
Verdict: Malicious activity
Threats:

Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.

Analysis date: March 24, 2025, 08:28:07
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
gh0st
rat
rdp
delphi
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

85112604C9ACED30B1E602D584EEDF40

SHA1:

8B9DFA8E27E491CA969B56E9C52FC0514F6CC474

SHA256:

4838B81833E4F92F3C803C4B669A0876435972832A7F235956FEE9D1A2616420

SSDEEP:

3072:NnUFKt3AoncEpr1sYfQot/ImihzIYY5BV9UCuvAXBYIMkuBbtplkPWzYlbpza5cB:+Fwf3oo5ImihMrfVFuvYYIMWzao

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GH0ST mutex has been found

      • rundll32.exe (PID: 5968)
      • svchost.exe (PID: 2284)
    • Create files in the Startup directory

      • rundll32.exe (PID: 5968)
      • svchost.exe (PID: 2284)
  • SUSPICIOUS

    • Executes application which crashes

      • rundll32.exe (PID: 5968)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 5968)
    • Creates file in the systems drive root

      • svchost.exe (PID: 2284)
      • rundll32.exe (PID: 5968)
    • Runs shell command (SCRIPT)

      • mshta.exe (PID: 8032)
    • Connects to unusual port

      • svchost.exe (PID: 2284)
      • rundll32.exe (PID: 5968)
    • There is functionality for enable RDP (YARA)

      • svchost.exe (PID: 2284)
  • INFO

    • Autorun file from Startup directory

      • rundll32.exe (PID: 5968)
      • svchost.exe (PID: 2284)
    • Creates files or folders in the user directory

      • rundll32.exe (PID: 5968)
      • WerFault.exe (PID: 5176)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 8032)
    • Manual execution by a user

      • mshta.exe (PID: 8032)
    • Compiled with Borland Delphi (YARA)

      • svchost.exe (PID: 2284)
    • Reads the software policy settings

      • slui.exe (PID: 7320)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, DLL, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 130560
InitializedDataSize: 9216
UninitializedDataSize: -
EntryPoint: 0x20c24
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #GH0ST rundll32.exe #GH0ST svchost.exe werfault.exe no specs sppextcomobj.exe no specs slui.exe mshta.exe no specs rundll32.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2284C:\WINDOWS\system32\svchost.exe -k rundll32C:\Windows\SysWOW64\svchost.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\sechost.dll
c:\windows\syswow64\rpcrt4.dll
4736C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5176C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5968 -s 624C:\Windows\SysWOW64\WerFault.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
5968"C:\WINDOWS\SysWOW64\rundll32.exe" "C:\Users\admin\AppData\Local\Temp\1 (1155).dll", #1C:\Windows\SysWOW64\rundll32.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
3221225477
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
7288C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7320"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8032"C:\Windows\SysWOW64\mshta.exe" "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}C:\Windows\SysWOW64\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
8100"C:\Windows\System32\rundll32.exe" "" InstallC:\Windows\SysWOW64\rundll32.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
3 519
Read events
3 516
Write events
3
Delete events
0

Modification events

(PID) Process:(8032) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(8032) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(8032) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
2
Suspicious files
3
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
5176WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_8b96a266d05a3f926744fb2133f041e775accbd3_67c333ae_9eafd177-1d71-4339-934f-c1654281aea9\Report.wer
MD5:
SHA256:
5176WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\rundll32.exe.5968.dmpbinary
MD5:19F7E1EE544BBD9DF9D9C1A59D3AC7E7
SHA256:021ED42841B67E5091FDB69C0349ED6ED07A19751D96EB6996B135E51168E2C2
5968rundll32.exeC:\Temp\AppPatch\ComBack.Dllexecutable
MD5:90553D9EC530E692D59905588CFC3F0C
SHA256:9B0784D1033E4BCC0C908DD7CE932E4E0C724706723BF747E329DFA0CAA736C9
5968rundll32.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.htahtml
MD5:16314A598FE98F0CDA7F70B6121CA7AF
SHA256:3B58A824937D323B8A46822F9DD4309BFC7BFD3A72F7D2DAD7CD38CA5E72A60F
5968rundll32.exeC:\Windows\Temp\comb.dlltext
MD5:D00AB6B03765AE50127C2357A92C2A4F
SHA256:9BF461DF720806F129AEC98A2D72432700299B03E1D33523C41CF886BF41E958
5176WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERBDF4.tmp.WERInternalMetadata.xmlbinary
MD5:54D502B37885A9579EBCC82FD9D801D5
SHA256:1410413E86E61397C0027AD2D8B8FD6F13665F9E7FB564A28082DD783A9C1C83
5968rundll32.exeC:\Temp\AppPatch\AcSvcst.dllexecutable
MD5:5E63245AA96A0C5AA74E9D9985E4F778
SHA256:3FBCC4A25587163EE4612A3B4DD1894149EF65D202C47D42D80FA538A24AFED5
5176WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERBCAB.tmp.dmpbinary
MD5:3F64613C3F3390E7568C10DBC0CCCB0E
SHA256:3860AD1DA32CF0DA78874AA9A30BB94E80C33054C8532AB8A1C31BFFA6382026
5176WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERBE33.tmp.xmlxml
MD5:11B36E43A9AF77979722CCCF91D9ED66
SHA256:C525F661331B5648A51121E038CCFA03574AB3319CAA473042E3EEE625A1B83A
2284svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.htahtml
MD5:16314A598FE98F0CDA7F70B6121CA7AF
SHA256:3B58A824937D323B8A46822F9DD4309BFC7BFD3A72F7D2DAD7CD38CA5E72A60F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
29
DNS requests
23
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2236
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2236
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7564
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2284
svchost.exe
221.10.93.196:2499
CHINA UNICOM China169 Backbone
CN
unknown
5968
rundll32.exe
221.10.93.196:2499
CHINA UNICOM China169 Backbone
CN
unknown
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 172.217.23.110
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.9
whitelisted
Guffery.3322.org
whitelisted
client.wns.windows.com
  • 40.113.110.67
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.159.0
  • 40.126.31.2
  • 20.190.159.131
  • 40.126.31.1
  • 40.126.31.67
  • 40.126.31.69
  • 20.190.159.73
  • 40.126.31.3
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET DYN_DNS DYNAMIC_DNS Query to 3322.org Domain
2196
svchost.exe
Misc activity
ET DYN_DNS DYNAMIC_DNS Query to 3322.org Domain
No debug info