Analysis
-
max time kernel
140s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 12:12
Behavioral task
behavioral1
Sample
d4aeccc1b429fed1f28dddd4b0831197b78e18589feb53bb7f46241a4e881cc2.dll
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
d4aeccc1b429fed1f28dddd4b0831197b78e18589feb53bb7f46241a4e881cc2.dll
-
Size
51KB
-
MD5
8f76f62b1ffc2de562dbc8b5cf38966a
-
SHA1
66a72250e7ab761fae7bff778542e8259b368a8a
-
SHA256
d4aeccc1b429fed1f28dddd4b0831197b78e18589feb53bb7f46241a4e881cc2
-
SHA512
bd010a06d8a02353b316a5ce31ccd0a0802f980439e070a68c121e593426a4fb89bbd214e6e6c2a3f64087a0607e68abfd589a5d16e1c7ef5218b1b1b5cb0a8c
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLbJYH5:1dWubF3n9S91BF3fbo3JYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1904-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1904 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1904 2504 rundll32.exe 83 PID 2504 wrote to memory of 1904 2504 rundll32.exe 83 PID 2504 wrote to memory of 1904 2504 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4aeccc1b429fed1f28dddd4b0831197b78e18589feb53bb7f46241a4e881cc2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4aeccc1b429fed1f28dddd4b0831197b78e18589feb53bb7f46241a4e881cc2.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1904
-