File name:

1 (1401)

Full analysis: https://app.any.run/tasks/559b6264-bd67-4a3b-9c19-9024f0ad0040
Verdict: Malicious activity
Threats:

Gh0st RAT is a malware with advanced trojan functionality that enables attackers to establish full control over the victim’s system. The spying capabilities of Gh0st RAT made it a go-to tool for numerous criminal groups in high-profile attacks against government and corporate organizations. The most common vector of attack involving this malware begins with spam and phishing emails.

Analysis date: March 24, 2025, 15:21:48
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
gh0st
rat
delphi
rdp
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

D3D86537A28D572A57A7C0D861241EC0

SHA1:

8C75B568881AA221FBBA9095CB195A3482C808BD

SHA256:

CE66E4203BC90C8B69EA358FDC2875BF7BF389207B6D3A1856451A9D24ACC063

SSDEEP:

3072:rnUFKt3AoncEpr1sYfQot/ImihzIYY5BV9UCuvAXBYIMkuBbtplkPWzYlbpza5cP:gFwf3oo5ImihMrfVFuvYYIMWzaQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • rundll32.exe (PID: 3300)
      • svchost.exe (PID: 7264)
    • GH0ST mutex has been found

      • rundll32.exe (PID: 3300)
      • svchost.exe (PID: 7264)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • rundll32.exe (PID: 3300)
      • svchost.exe (PID: 7264)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 3300)
    • Executes application which crashes

      • rundll32.exe (PID: 3300)
    • Connects to unusual port

      • rundll32.exe (PID: 3300)
      • svchost.exe (PID: 7264)
    • There is functionality for enable RDP (YARA)

      • svchost.exe (PID: 7264)
    • Runs shell command (SCRIPT)

      • mshta.exe (PID: 7236)
  • INFO

    • Creates files or folders in the user directory

      • rundll32.exe (PID: 3300)
    • Autorun file from Startup directory

      • rundll32.exe (PID: 3300)
      • svchost.exe (PID: 7264)
    • Compiled with Borland Delphi (YARA)

      • svchost.exe (PID: 7264)
    • Manual execution by a user

      • mshta.exe (PID: 7236)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, DLL, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 130560
InitializedDataSize: 9216
UninitializedDataSize: -
EntryPoint: 0x20c24
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #GH0ST rundll32.exe #GH0ST svchost.exe werfault.exe no specs sppextcomobj.exe no specs slui.exe mshta.exe no specs rundll32.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2108C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3300"C:\WINDOWS\SysWOW64\rundll32.exe" "C:\Users\admin\AppData\Local\Temp\1 (1401).dll", #1C:\Windows\SysWOW64\rundll32.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
3221225477
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5332"C:\Windows\System32\rundll32.exe" "" InstallC:\Windows\SysWOW64\rundll32.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
7236"C:\Windows\SysWOW64\mshta.exe" "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}C:\Windows\SysWOW64\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
7264C:\WINDOWS\system32\svchost.exe -k rundll32C:\Windows\SysWOW64\svchost.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\sechost.dll
c:\windows\syswow64\rpcrt4.dll
7332C:\WINDOWS\SysWOW64\WerFault.exe -u -p 3300 -s 640C:\Windows\SysWOW64\WerFault.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7464C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7496"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 519
Read events
3 516
Write events
3
Delete events
0

Modification events

(PID) Process:(7236) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7236) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7236) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
2
Suspicious files
3
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
7332WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_8b96a266d05a3f926744fb2133f041e775accbd3_67c333ae_5365eab4-f577-4f23-8470-1c059cf0eda1\Report.wer
MD5:
SHA256:
3300rundll32.exeC:\Temp\AppPatch\ComBack.Dllexecutable
MD5:101CFF5CB9EF0A6C657AEB0A68699238
SHA256:47592FD45BF456BD3D356E74003C654C58ADD89DCE279EB9B516FDE630B94A11
3300rundll32.exeC:\Temp\AppPatch\comb.dlltext
MD5:D00AB6B03765AE50127C2357A92C2A4F
SHA256:9BF461DF720806F129AEC98A2D72432700299B03E1D33523C41CF886BF41E958
3300rundll32.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.htahtml
MD5:16314A598FE98F0CDA7F70B6121CA7AF
SHA256:3B58A824937D323B8A46822F9DD4309BFC7BFD3A72F7D2DAD7CD38CA5E72A60F
7332WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE541.tmp.dmpbinary
MD5:2672ADF4133FE7D237A01BFB283AACCE
SHA256:9C8906D4AF8EAF80621B1C8A0F187424492751F99D6FB1A4B191E0DB595DD334
3300rundll32.exeC:\Temp\AppPatch\AcSvcst.dllexecutable
MD5:337F685ECE32AC32DD953EC74FF52497
SHA256:9610D99FDADB20FF2DD455D7D47E55B6AB62F23FFD571A914BDD1ECF15D6BEAC
7332WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE822.tmp.xmlxml
MD5:3776F6151F8565DC75D7857478A3EB55
SHA256:6A0716C2658AEEA5CE9F5D5D45B421DBD3011929835BB680FAAB7461DA43C226
7264svchost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.htahtml
MD5:16314A598FE98F0CDA7F70B6121CA7AF
SHA256:3B58A824937D323B8A46822F9DD4309BFC7BFD3A72F7D2DAD7CD38CA5E72A60F
7332WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERE7E2.tmp.WERInternalMetadata.xmlbinary
MD5:AB46D74CAAC04F34BD491506529DD771
SHA256:2D518E734F83E5179DD0AC47DAF15FFA225A10EE16DCECF3991E353C0E105359
7332WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\rundll32.exe.3300.dmpbinary
MD5:068F359F4F94F0A5B40FA0A7B84CE80B
SHA256:6DB67D8C0A0A69B9F760BA16566BAD698448F4592F5BE2E706BB0172EA3D6FBC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
36
DNS requests
30
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.162:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5776
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
2244
backgroundTaskHost.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5776
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
1388
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1388
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.162:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.160.132:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.54.109.203:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3300
rundll32.exe
221.10.93.196:2499
CHINA UNICOM China169 Backbone
CN
unknown
7264
svchost.exe
221.10.93.196:2499
CHINA UNICOM China169 Backbone
CN
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 23.48.23.162
  • 23.48.23.190
  • 23.48.23.177
  • 23.48.23.183
  • 23.48.23.193
  • 23.48.23.168
  • 23.48.23.181
  • 23.48.23.173
  • 23.48.23.164
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.160.132
  • 20.190.160.65
  • 20.190.160.20
  • 20.190.160.64
  • 20.190.160.2
  • 20.190.160.17
  • 40.126.32.76
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 23.54.109.203
whitelisted
Guffery.3322.org
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET DYN_DNS DYNAMIC_DNS Query to 3322.org Domain
2196
svchost.exe
Misc activity
ET DYN_DNS DYNAMIC_DNS Query to 3322.org Domain
No debug info