Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 13:07
Behavioral task
behavioral1
Sample
fc0ee1019d1d70fe50276370eb04239799952a96c7eabc72353ab98462bdaea4.dll
Resource
win7-20240903-en
General
-
Target
fc0ee1019d1d70fe50276370eb04239799952a96c7eabc72353ab98462bdaea4.dll
-
Size
50KB
-
MD5
8a4ddc983d187eed6d044aba09d2e6e9
-
SHA1
8172aa1c1922542adebdd2c21f544e6d363d5aa5
-
SHA256
fc0ee1019d1d70fe50276370eb04239799952a96c7eabc72353ab98462bdaea4
-
SHA512
9c064f74a144ced1328f40204bd1032c9df7178c8aa07c877676b5f7a958b07f63a2a7342a2121a438e8a758edc02003c316e2d54500a477e69b19318caac72f
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5lJYH:W5ReWjTrW9rNPgYorJYH
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3556-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3556 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1448 wrote to memory of 3556 1448 rundll32.exe 83 PID 1448 wrote to memory of 3556 1448 rundll32.exe 83 PID 1448 wrote to memory of 3556 1448 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc0ee1019d1d70fe50276370eb04239799952a96c7eabc72353ab98462bdaea4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc0ee1019d1d70fe50276370eb04239799952a96c7eabc72353ab98462bdaea4.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3556
-