Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 10:44
Behavioral task
behavioral1
Sample
7d14069ed09b7a67747c84eba38e2ee0N.dll
Resource
win7-20240705-en
5 signatures
120 seconds
General
-
Target
7d14069ed09b7a67747c84eba38e2ee0N.dll
-
Size
899KB
-
MD5
7d14069ed09b7a67747c84eba38e2ee0
-
SHA1
201e6f8092e18250e3f0486e6eebaba5d1876370
-
SHA256
67af4c8255ab21348427cc226b6ef600090038389d4e277223eea1fea8db393b
-
SHA512
9cc8afa767443375d46321d5abb781ef6a05d26b972c30613063ae5a102171e2f39275d2e77b32f21d5ef921c5f40ea6a02fc8460533e68af317e1486415077f
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXr:7wqd87Vr
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1636-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1636 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1636 1592 rundll32.exe 29 PID 1592 wrote to memory of 1636 1592 rundll32.exe 29 PID 1592 wrote to memory of 1636 1592 rundll32.exe 29 PID 1592 wrote to memory of 1636 1592 rundll32.exe 29 PID 1592 wrote to memory of 1636 1592 rundll32.exe 29 PID 1592 wrote to memory of 1636 1592 rundll32.exe 29 PID 1592 wrote to memory of 1636 1592 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d14069ed09b7a67747c84eba38e2ee0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d14069ed09b7a67747c84eba38e2ee0N.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1636
-