Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 00:54
Behavioral task
behavioral1
Sample
e88c27ad70f89bf1966a1a4041034e4e17b9bb34b4bff7e0a392f5498238d58a.dll
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
e88c27ad70f89bf1966a1a4041034e4e17b9bb34b4bff7e0a392f5498238d58a.dll
-
Size
51KB
-
MD5
7404f0c00d1e7676b5c34f2818bcd935
-
SHA1
a84683f96f302f9ff04b0188402cb3f365b25661
-
SHA256
e88c27ad70f89bf1966a1a4041034e4e17b9bb34b4bff7e0a392f5498238d58a
-
SHA512
6544b2b43cc733ee5b704d7de976134aec12b71885a981d8d855369650e837f0b39bf95d08f5c66b7913647f64904f9d96af0ee7e8f45bb2d29f3f1647b1f57f
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLRJYH5:1dWubF3n9S91BF3fbolJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2148-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2148 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2148 2364 rundll32.exe 31 PID 2364 wrote to memory of 2148 2364 rundll32.exe 31 PID 2364 wrote to memory of 2148 2364 rundll32.exe 31 PID 2364 wrote to memory of 2148 2364 rundll32.exe 31 PID 2364 wrote to memory of 2148 2364 rundll32.exe 31 PID 2364 wrote to memory of 2148 2364 rundll32.exe 31 PID 2364 wrote to memory of 2148 2364 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e88c27ad70f89bf1966a1a4041034e4e17b9bb34b4bff7e0a392f5498238d58a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e88c27ad70f89bf1966a1a4041034e4e17b9bb34b4bff7e0a392f5498238d58a.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2148
-