Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 10:40
Behavioral task
behavioral1
Sample
9014e85a9c59494b80ebd48dc0d4706d548e181e07b20d17013eeec96e10d47a.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
9014e85a9c59494b80ebd48dc0d4706d548e181e07b20d17013eeec96e10d47a.dll
-
Size
51KB
-
MD5
7494c651020fedb4363d388a5e1762ce
-
SHA1
027711341baf08d2b6dd19f5a804e19d5d24eaab
-
SHA256
9014e85a9c59494b80ebd48dc0d4706d548e181e07b20d17013eeec96e10d47a
-
SHA512
0c4a37683914b90c2264f6a65d396b51d007d1f160d768540333b613ac57369fa7484016a3dbbb2d6e2add1e083fe87599179502513bec3691a662a9e2c05276
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLrJYH5:1dWubF3n9S91BF3fbo/JYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1792-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1792 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9014e85a9c59494b80ebd48dc0d4706d548e181e07b20d17013eeec96e10d47a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9014e85a9c59494b80ebd48dc0d4706d548e181e07b20d17013eeec96e10d47a.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1792
-