Analysis
-
max time kernel
110s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:35
Behavioral task
behavioral1
Sample
cf3c49d045a56451a4ee5509aa48f281c5c2c23f8d9de0d47505cfed3d1a2e5aN.dll
Resource
win7-20240903-en
5 signatures
120 seconds
General
-
Target
cf3c49d045a56451a4ee5509aa48f281c5c2c23f8d9de0d47505cfed3d1a2e5aN.dll
-
Size
899KB
-
MD5
050befdbee40e7839f597ddde9cba8e0
-
SHA1
7fe0cd4b718155e9dc2df4470121eef752485a34
-
SHA256
cf3c49d045a56451a4ee5509aa48f281c5c2c23f8d9de0d47505cfed3d1a2e5a
-
SHA512
d17c14a24102e9acf6341b0f6422dfe5ed84df66aceb39751d72faf8ab6915b6079b05dc0bc0bd54373065d2961c61213d0132a7a054a72d4f303d264d89145e
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXL:7wqd87VL
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3824-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3824 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 448 wrote to memory of 3824 448 rundll32.exe 82 PID 448 wrote to memory of 3824 448 rundll32.exe 82 PID 448 wrote to memory of 3824 448 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf3c49d045a56451a4ee5509aa48f281c5c2c23f8d9de0d47505cfed3d1a2e5aN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf3c49d045a56451a4ee5509aa48f281c5c2c23f8d9de0d47505cfed3d1a2e5aN.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3824
-