Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 20:14
Behavioral task
behavioral1
Sample
77f6ea0248012e3a603169ee36c8f3f3b8c70eb178785dac34915f1b8608cc23.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
77f6ea0248012e3a603169ee36c8f3f3b8c70eb178785dac34915f1b8608cc23.dll
-
Size
1.5MB
-
MD5
49a70b9cc7f340bcb7359f73c1930ada
-
SHA1
833ee164382e73d96b57bd5e03580497015e1bf1
-
SHA256
77f6ea0248012e3a603169ee36c8f3f3b8c70eb178785dac34915f1b8608cc23
-
SHA512
43e5a6a42dac53163d23dd103396259dd60618c27b32dad5b5e4d05d249a645bf6219a66a01d1d5df18f95fb0083c06f19a42033399033ca2c826e745873a89c
-
SSDEEP
24576:7MfywgIt/65Fu99573/aiVIOYrFzpCM5hyv3m8AMtRyce0L3OK0B:l49r6
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2040-0-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2040-0-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
resource yara_rule behavioral2/memory/2040-0-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4204 2040 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3424 wrote to memory of 2040 3424 rundll32.exe 82 PID 3424 wrote to memory of 2040 3424 rundll32.exe 82 PID 3424 wrote to memory of 2040 3424 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\77f6ea0248012e3a603169ee36c8f3f3b8c70eb178785dac34915f1b8608cc23.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\77f6ea0248012e3a603169ee36c8f3f3b8c70eb178785dac34915f1b8608cc23.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 5563⤵
- Program crash
PID:4204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2040 -ip 20401⤵PID:3816