Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 17:51
Behavioral task
behavioral1
Sample
994b15768bc7f1b62f0a53f4d33681e3b45a56717213336745b84abd5e042feb.dll
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
994b15768bc7f1b62f0a53f4d33681e3b45a56717213336745b84abd5e042feb.dll
-
Size
899KB
-
MD5
3516b9b5db5601128199f338fb09bcd1
-
SHA1
65504f4afad45842386a715703d764d3ba5b84dc
-
SHA256
994b15768bc7f1b62f0a53f4d33681e3b45a56717213336745b84abd5e042feb
-
SHA512
1929345f9ab231311c7962b5f3cdc8506e9fa4ca5f631dbd14809fe18514552e16a12ce69ff37a1fad04d0f530587ff47561b0934272ff8361000cf8e0af1e89
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXI:7wqd87VI
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2796-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2796 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2796 2712 rundll32.exe 30 PID 2712 wrote to memory of 2796 2712 rundll32.exe 30 PID 2712 wrote to memory of 2796 2712 rundll32.exe 30 PID 2712 wrote to memory of 2796 2712 rundll32.exe 30 PID 2712 wrote to memory of 2796 2712 rundll32.exe 30 PID 2712 wrote to memory of 2796 2712 rundll32.exe 30 PID 2712 wrote to memory of 2796 2712 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\994b15768bc7f1b62f0a53f4d33681e3b45a56717213336745b84abd5e042feb.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\994b15768bc7f1b62f0a53f4d33681e3b45a56717213336745b84abd5e042feb.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2796
-