Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 02:03
Behavioral task
behavioral1
Sample
369daa13127e31dd04f4ed0f71172c645d85c351b79b46ce5dc4442627a09016.dll
Resource
win7-20240704-en
5 signatures
150 seconds
General
-
Target
369daa13127e31dd04f4ed0f71172c645d85c351b79b46ce5dc4442627a09016.dll
-
Size
50KB
-
MD5
cf3225b217ca3a0c47b64661ab833745
-
SHA1
e669171c9e573b91dc1799a254076ed5c732bc50
-
SHA256
369daa13127e31dd04f4ed0f71172c645d85c351b79b46ce5dc4442627a09016
-
SHA512
4c3a091ee51a13fd7fc11ff510a20c8ea05ffd6decb406b324a7d172b5806ad7a93b065ae8253716717578acf50fe2cabb2a6a652217227708152e2e8e14d755
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5tJYH:W5ReWjTrW9rNPgYobJYH
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2076-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2076 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31 PID 2032 wrote to memory of 2076 2032 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\369daa13127e31dd04f4ed0f71172c645d85c351b79b46ce5dc4442627a09016.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\369daa13127e31dd04f4ed0f71172c645d85c351b79b46ce5dc4442627a09016.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2076
-