Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 00:25
Behavioral task
behavioral1
Sample
b7ff0d24e8d56942b19ee68d3f78e3a796126e8f27de39b637b698907a272ced.dll
Resource
win7-20240729-en
windows7-x64
5 signatures
150 seconds
General
-
Target
b7ff0d24e8d56942b19ee68d3f78e3a796126e8f27de39b637b698907a272ced.dll
-
Size
899KB
-
MD5
db98798f1a401a8491d64a4dd6f71e67
-
SHA1
a90afc911390e6c457e0a0e6bf17c031f0916732
-
SHA256
b7ff0d24e8d56942b19ee68d3f78e3a796126e8f27de39b637b698907a272ced
-
SHA512
6804f3fa9ee2f415888bed648d8f82428fbe015b7fd464a01254ff1aba573ea2595ab2d1d260957d3fe92fc21787382853d7028261d705c96f2e43bd4241bfec
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXx:7wqd87Vx
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2888-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2888 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30 PID 1508 wrote to memory of 2888 1508 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7ff0d24e8d56942b19ee68d3f78e3a796126e8f27de39b637b698907a272ced.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7ff0d24e8d56942b19ee68d3f78e3a796126e8f27de39b637b698907a272ced.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2888
-