File name:

1 (1316)

Full analysis: https://app.any.run/tasks/d250442e-a606-4b5d-9d13-c32f36dce67b
Verdict: Malicious activity
Threats:

Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.

Analysis date: March 24, 2025, 13:02:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
gh0st
rat
delphi
rdp
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

BD5ED76C8B46C539739ED78C8FA3FAC0

SHA1:

0B615CD181AC257D1A4ED72C61844A4C09AEA655

SHA256:

C6BDB60B65FC427C9E0AC79BA49F17A74656B28D96445E63E460186449B44029

SSDEEP:

3072:JnUFKt3AoncEpr1sYfQot/ImihzIYY5BV9UCuvAXBYIMkuBbtplkPWzYlbpza5cm:SFwf3oo5ImihMrfVFuvYYIMWza

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • svchost.exe (PID: 7272)
      • rundll32.exe (PID: 4108)
    • GH0ST mutex has been found

      • rundll32.exe (PID: 4108)
      • svchost.exe (PID: 7272)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • rundll32.exe (PID: 4108)
      • svchost.exe (PID: 7272)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 4108)
    • Executes application which crashes

      • rundll32.exe (PID: 4108)
    • Connects to unusual port

      • svchost.exe (PID: 7272)
      • rundll32.exe (PID: 4108)
    • Runs shell command (SCRIPT)

      • mshta.exe (PID: 7252)
    • There is functionality for enable RDP (YARA)

      • svchost.exe (PID: 7272)
  • INFO

    • Creates files or folders in the user directory

      • rundll32.exe (PID: 4108)
      • WerFault.exe (PID: 7328)
    • Autorun file from Startup directory

      • svchost.exe (PID: 7272)
      • rundll32.exe (PID: 4108)
    • Manual execution by a user

      • mshta.exe (PID: 7252)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 7252)
    • Compiled with Borland Delphi (YARA)

      • svchost.exe (PID: 7272)
    • Reads the software policy settings

      • slui.exe (PID: 7472)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, DLL, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 130560
InitializedDataSize: 9216
UninitializedDataSize: -
EntryPoint: 0x20c24
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #GH0ST rundll32.exe #GH0ST svchost.exe werfault.exe no specs sppextcomobj.exe no specs slui.exe mshta.exe no specs rundll32.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4108"C:\WINDOWS\SysWOW64\rundll32.exe" "C:\Users\admin\AppData\Local\Temp\1 (1316).dll", #1C:\Windows\SysWOW64\rundll32.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
3221225477
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6036"C:\Windows\System32\rundll32.exe" "" InstallC:\Windows\SysWOW64\rundll32.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
7252"C:\Windows\SysWOW64\mshta.exe" "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}C:\Windows\SysWOW64\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
7272C:\WINDOWS\system32\svchost.exe -k rundll32C:\Windows\SysWOW64\svchost.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\sechost.dll
c:\windows\syswow64\rpcrt4.dll
7328C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4108 -s 652C:\Windows\SysWOW64\WerFault.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7440C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7472"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7512C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 519
Read events
3 516
Write events
3
Delete events
0

Modification events

(PID) Process:(7252) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7252) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7252) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
2
Suspicious files
3
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
7328WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_8b96a266d05a3f926744fb2133f041e775accbd3_67c333ae_d7d1c1f1-2c9b-44dc-9e5e-f3d6a07c367e\Report.wer
MD5:
SHA256:
4108rundll32.exeC:\Temp\AppPatch\comb.dlltext
MD5:D00AB6B03765AE50127C2357A92C2A4F
SHA256:9BF461DF720806F129AEC98A2D72432700299B03E1D33523C41CF886BF41E958
4108rundll32.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.htahtml
MD5:16314A598FE98F0CDA7F70B6121CA7AF
SHA256:3B58A824937D323B8A46822F9DD4309BFC7BFD3A72F7D2DAD7CD38CA5E72A60F
4108rundll32.exeC:\Windows\Temp\comb.dlltext
MD5:D00AB6B03765AE50127C2357A92C2A4F
SHA256:9BF461DF720806F129AEC98A2D72432700299B03E1D33523C41CF886BF41E958
7272svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.htahtml
MD5:16314A598FE98F0CDA7F70B6121CA7AF
SHA256:3B58A824937D323B8A46822F9DD4309BFC7BFD3A72F7D2DAD7CD38CA5E72A60F
4108rundll32.exeC:\Temp\AppPatch\ComBack.Dllexecutable
MD5:59B2A20CC956BFCE2D7648E7695EBA9B
SHA256:75959544CDE9352E719C7DE0A2CC67D8A77027FEAB1D00F9F9DD310F9250DB42
4108rundll32.exeC:\Temp\AppPatch\AcSvcst.dllexecutable
MD5:81A7EC1896740ABBD1B6C246C089B5FB
SHA256:E444E52428A81EC76BC7D088E0E8E7FB8C6D0C2B23E7C1B8BECB3E9CCFDF7F15
7328WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERBAB8.tmp.WERInternalMetadata.xmlbinary
MD5:AF062EB4CBD8F42AD2FF77E5AA94E6F7
SHA256:AE4B498340AC0CA3621C02019E7AC9DC5833382D58AA100E1C163CD8F3B76B10
7328WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERB901.tmp.dmpbinary
MD5:F44F6A59CB109D1622C129C67E42EEE5
SHA256:B9A4E461726BF9622F97C281C9E8AA03E68AED05AE200ED00CB3E578C99E6D6C
7328WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\rundll32.exe.4108.dmpbinary
MD5:86B61FAC981681A2B9AEFFE73DBE00B0
SHA256:E178A2C79A3AD7B47D5D4C471BD7F6D24E691709D3D73D3A890412984D8E1F7A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
31
DNS requests
23
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7544
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5504
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5504
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
7272
svchost.exe
221.10.93.196:2499
CHINA UNICOM China169 Backbone
CN
unknown
4108
rundll32.exe
221.10.93.196:2499
CHINA UNICOM China169 Backbone
CN
unknown
3216
svchost.exe
20.198.162.76:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6544
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
Guffery.3322.org
whitelisted
client.wns.windows.com
  • 20.198.162.76
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.23
  • 40.126.31.131
  • 40.126.31.0
  • 40.126.31.129
  • 40.126.31.1
  • 20.190.159.75
  • 40.126.31.73
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET DYN_DNS DYNAMIC_DNS Query to 3322.org Domain
2196
svchost.exe
Misc activity
ET DYN_DNS DYNAMIC_DNS Query to 3322.org Domain
No debug info