File name:

838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e

Full analysis: https://app.any.run/tasks/29da779f-bfdd-482a-9344-ac15c475a286
Verdict: Malicious activity
Threats:

Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.

Analysis date: March 24, 2025, 19:21:11
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
zegost
loader
gh0st
rat
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

E461512DE8D7FAD5B3B209346497AFFC

SHA1:

EF22AA4864C3CD63E63BB953C1AF8B4EE469DC8F

SHA256:

838E641F96C424F111734144B3D0538659C60D3BB288A8D4C9CC5AFA25D3468E

SSDEEP:

98304:siINeEg+diXSVSg5Lru5zX46Tg8Dpw7ubEvnB3H/eyJHELjXasDTDB7DHdGj4:v

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ZEGOST has been detected

      • R.exe (PID: 6768)
    • GH0ST mutex has been found

      • TXPlatfor.exe (PID: 3888)
      • TXPlatfor.exe (PID: 1276)
    • GH0ST has been detected

      • N.exe (PID: 920)
    • Starts CMD.EXE for self-deleting

      • N.exe (PID: 920)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • R.exe (PID: 6768)
      • N.exe (PID: 920)
      • 838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe (PID: 2108)
      • TXPlatfor.exe (PID: 1276)
    • Creates or modifies Windows services

      • R.exe (PID: 6768)
      • TXPlatfor.exe (PID: 1276)
    • Executes as Windows Service

      • TXPlatfor.exe (PID: 3888)
    • Hides command output

      • cmd.exe (PID: 5124)
    • Starts CMD.EXE for commands execution

      • N.exe (PID: 920)
    • Application launched itself

      • TXPlatfor.exe (PID: 3888)
    • Creates files in the driver directory

      • TXPlatfor.exe (PID: 1276)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 5124)
    • Drops a system driver (possible attempt to evade defenses)

      • TXPlatfor.exe (PID: 1276)
    • There is functionality for taking screenshot (YARA)

      • 838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe (PID: 2108)
      • TXPlatfor.exe (PID: 1276)
  • INFO

    • The sample compiled with chinese language support

      • 838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe (PID: 2108)
    • Checks supported languages

      • R.exe (PID: 6768)
      • N.exe (PID: 920)
      • TXPlatfor.exe (PID: 3888)
      • TXPlatfor.exe (PID: 1276)
      • HD_838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe (PID: 6656)
      • 838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe (PID: 2108)
    • Reads the computer name

      • R.exe (PID: 6768)
      • N.exe (PID: 920)
      • TXPlatfor.exe (PID: 3888)
      • TXPlatfor.exe (PID: 1276)
      • HD_838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe (PID: 6656)
    • Checks proxy server information

      • slui.exe (PID: 896)
    • Create files in a temporary directory

      • 838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe (PID: 2108)
    • UPX packer has been detected

      • TXPlatfor.exe (PID: 1276)
    • Reads the software policy settings

      • slui.exe (PID: 896)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:04:10 02:40:30+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 520192
InitializedDataSize: 2162688
UninitializedDataSize: -
EntryPoint: 0x60da5
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 8.9.8.9
ProductVersionNumber: 8.9.8.9
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
FileVersion: 8.9.8.9
FileDescription: 应用程序
ProductName: RuntimeBroker
ProductVersion: 8.9.8.9
CompanyName: RuntimeBroker
LegalCopyright: RuntimeBroker
Comments: RuntimeBroker
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
11
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe #ZEGOST r.exe n.exe #GH0ST txplatfor.exe no specs cmd.exe no specs conhost.exe no specs #GH0ST txplatfor.exe hd_838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe no specs ping.exe no specs slui.exe 838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
896C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
920C:\Users\admin\AppData\Local\Temp\\N.exeC:\Users\admin\AppData\Local\Temp\N.exe
838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\n.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1276C:\WINDOWS\SysWOW64\TXPlatfor.exe -acsiC:\Windows\SysWOW64\TXPlatfor.exe
TXPlatfor.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Modules
Images
c:\windows\syswow64\txplatfor.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
2108"C:\Users\admin\Desktop\838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe" C:\Users\admin\Desktop\838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe
explorer.exe
User:
admin
Company:
RuntimeBroker
Integrity Level:
HIGH
Description:
应用程序
Version:
8.9.8.9
Modules
Images
c:\users\admin\desktop\838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
3272"C:\Users\admin\Desktop\838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe" C:\Users\admin\Desktop\838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exeexplorer.exe
User:
admin
Company:
RuntimeBroker
Integrity Level:
MEDIUM
Description:
应用程序
Exit code:
3221226540
Version:
8.9.8.9
Modules
Images
c:\users\admin\desktop\838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3888C:\WINDOWS\SysWOW64\TXPlatfor.exe -autoC:\Windows\SysWOW64\TXPlatfor.exe
services.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Modules
Images
c:\windows\syswow64\txplatfor.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5072\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5124C:\WINDOWS\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\admin\AppData\Local\Temp\N.exe > nulC:\Windows\SysWOW64\cmd.exeN.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6656C:\Users\admin\Desktop\HD_838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exeC:\Users\admin\Desktop\HD_838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\hd_838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6768C:\Users\admin\AppData\Local\Temp\\R.exeC:\Users\admin\AppData\Local\Temp\R.exe
838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exe
User:
admin
Company:
FEIM Studios
Integrity Level:
HIGH
Description:
A Free Enterprise Instant Messenger
Exit code:
0
Version:
3, 5, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\r.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
3 914
Read events
3 897
Write events
17
Delete events
0

Modification events

(PID) Process:(6768) R.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Remote Data
Operation:writeName:Description
Value:
¹ÜÀí»ùÓÚ×é¼þ¶ÔÏóÄ£Ð͵ĺËÐÄ·þÎñ¡£Èç¹û·þÎñ±»½ûÓ㬼ÆËã»ú½«ÎÞ·¨Õý³£ÔËÐС£
(PID) Process:(6768) R.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Remote Data\Parameters
Operation:writeName:ServiceDll
Value:
C:\WINDOWS\system32\1098890.txt
(PID) Process:(6768) R.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Svchost
Operation:writeName:Remote Data
Value:
Remote Data
(PID) Process:(920) N.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Select
Operation:writeName:MarkTime
Value:
2025-03-24 19:21
(PID) Process:(1276) TXPlatfor.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:Type
Value:
2
(PID) Process:(1276) TXPlatfor.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:Start
Value:
1
(PID) Process:(1276) TXPlatfor.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:ErrorControl
Value:
0
(PID) Process:(1276) TXPlatfor.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:ImagePath
Value:
system32\DRIVERS\QAssist.sys
(PID) Process:(1276) TXPlatfor.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:DisplayName
Value:
QAssist
(PID) Process:(1276) TXPlatfor.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\QAssist
Operation:writeName:Group
Value:
FSFilter Activity Monitor
Executable files
7
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6768R.exeC:\Windows\SysWOW64\1098890.txtexecutable
MD5:FAC9BCF8351948CBB5ED09BA9AAA3B62
SHA256:7E3E59ECB8ADCD5E61B0C04A676F73467F311FC106EF08AF64F4D2CC532B7346
2108838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exeC:\Users\admin\AppData\Local\Temp\R.exeexecutable
MD5:8DC3ADF1C490211971C1E2325F1424D2
SHA256:BC29F2022AB3B812E50C8681FF196F090C038B5AB51E37DAFFAC4469A8C2EB2C
2108838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exeC:\Users\admin\AppData\Local\Temp\N.exeexecutable
MD5:4A36A48E58829C22381572B2040B6FE0
SHA256:3DE6C02F52A661B8F934F59541D0CF297BB489EB2155E346B63C7338E09AEAF8
2108838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exeC:\Users\admin\Desktop\HD_838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exeexecutable
MD5:89F20B9B78CBDCF417F1A0A0BCE10944
SHA256:9C716E7954E6FE110BC81F47AA8429E3DA4188CE53420A05158F5274B1BE2F11
2108838e641f96c424f111734144b3d0538659c60d3bb288a8d4c9cc5afa25d3468e.exeC:\Users\admin\AppData\Local\Temp\HD_X.datexecutable
MD5:BAF3CFF400FA65ADB377E6179D7E92CE
SHA256:CBE788ADE8B4B72CDD6593D7C5C903FA3C44AF51933FFBBA75BE1DD44BF837B5
1276TXPlatfor.exeC:\Windows\System32\drivers\QAssist.sysexecutable
MD5:4E34C068E764AD0FF0CB58BC4F143197
SHA256:6CCE28B275D5EC20992BB13790976CAF434AB46DDBFD5CFD431D33424943122B
920N.exeC:\Windows\SysWOW64\TXPlatfor.exeexecutable
MD5:4A36A48E58829C22381572B2040B6FE0
SHA256:3DE6C02F52A661B8F934F59541D0CF297BB489EB2155E346B63C7338E09AEAF8
6768R.exeC:\Windows\SysWOW64\ini.initext
MD5:26BE2CE2E1C5BF73E617AF19A223C151
SHA256:08F4C919BFF717947A2F2DCDB2481F40613A9CEDDAE603ABE304D4D42E13CECA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
20
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6668
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
896
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
hackerinvasion.f3322.net
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info