Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 23:08
Behavioral task
behavioral1
Sample
dee559c587b9a8ada616343fa8e4426ac09162be124eb0fd0b7ccc53e1771fdf.dll
Resource
win7-20240704-en
General
-
Target
dee559c587b9a8ada616343fa8e4426ac09162be124eb0fd0b7ccc53e1771fdf.dll
-
Size
51KB
-
MD5
00e2341f5db7b407d170790d87cc2e4a
-
SHA1
ecf9bf84ca7f6b10c7009828d3c69841fd5850d3
-
SHA256
dee559c587b9a8ada616343fa8e4426ac09162be124eb0fd0b7ccc53e1771fdf
-
SHA512
dc284e58436da62b966183f146a0ba53771753bf72626a108cf017d45a89c38d1fe126ec70ca26ac987d8ffe576b7e069cd00b762ea457dd805575c5abcdfb59
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL7JYH5:1dWubF3n9S91BF3fboHJYH5
Malware Config
Extracted
gh0strat
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4924-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4924 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2900 wrote to memory of 4924 2900 rundll32.exe 83 PID 2900 wrote to memory of 4924 2900 rundll32.exe 83 PID 2900 wrote to memory of 4924 2900 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dee559c587b9a8ada616343fa8e4426ac09162be124eb0fd0b7ccc53e1771fdf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dee559c587b9a8ada616343fa8e4426ac09162be124eb0fd0b7ccc53e1771fdf.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4924
-