Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-08-2024 06:22
Behavioral task
behavioral1
Sample
e5f1182293ca0fd96a8d3cd2242585359cd2c13d4171516b967b27bd1212fb51.dll
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
General
-
Target
e5f1182293ca0fd96a8d3cd2242585359cd2c13d4171516b967b27bd1212fb51.dll
-
Size
51KB
-
MD5
34bfb02f8599d5423718a91316a8f519
-
SHA1
9fc52a82a6c35ccf88786ffa99f13168b7d085f6
-
SHA256
e5f1182293ca0fd96a8d3cd2242585359cd2c13d4171516b967b27bd1212fb51
-
SHA512
511698ea9fde9309cc0b7b143eb8adff4163c9ce016c11edcfbe4229997f2475a05a44e5b6bec80ae417efcefa30ac943ce453e3c71c99547a71ccbe5ad3d4cc
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLdJYH5:1dWubF3n9S91BF3fbopJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2888-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2888 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30 PID 2720 wrote to memory of 2888 2720 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5f1182293ca0fd96a8d3cd2242585359cd2c13d4171516b967b27bd1212fb51.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5f1182293ca0fd96a8d3cd2242585359cd2c13d4171516b967b27bd1212fb51.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2888
-