Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 08:08
Behavioral task
behavioral1
Sample
21da6f5c35d7236c031178fc72705896269719be99d9459b0b56323deac3ed4d.dll
Resource
win7-20240729-en
windows7-x64
5 signatures
150 seconds
General
-
Target
21da6f5c35d7236c031178fc72705896269719be99d9459b0b56323deac3ed4d.dll
-
Size
51KB
-
MD5
8dd2e57aaac056a0a8bbcd7a3b3c156c
-
SHA1
0f338375ee3eda11d0d839ad8833356908057400
-
SHA256
21da6f5c35d7236c031178fc72705896269719be99d9459b0b56323deac3ed4d
-
SHA512
92ab3caf35e43a8967cf4ec4502c7a6ceb4bf60c4ddc2449b88357b4b33362db98e4ab84053ba0af6384362d2798258e80d2b382f76456824bc22edbbd1bba9d
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLKJYH5:1dWubF3n9S91BF3fboOJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3008-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3008 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5004 wrote to memory of 3008 5004 rundll32.exe 83 PID 5004 wrote to memory of 3008 5004 rundll32.exe 83 PID 5004 wrote to memory of 3008 5004 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21da6f5c35d7236c031178fc72705896269719be99d9459b0b56323deac3ed4d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21da6f5c35d7236c031178fc72705896269719be99d9459b0b56323deac3ed4d.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3008
-