Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 23:11
Behavioral task
behavioral1
Sample
e56a9c5e4f5f672fe12d029507bcf9e39e81640579eafe91b2114f1aa3adefb9.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
e56a9c5e4f5f672fe12d029507bcf9e39e81640579eafe91b2114f1aa3adefb9.dll
-
Size
899KB
-
MD5
09a4fd759a174b6677393f1b75eaaf35
-
SHA1
e6560583606ded8c4ee702d88114f91525958a87
-
SHA256
e56a9c5e4f5f672fe12d029507bcf9e39e81640579eafe91b2114f1aa3adefb9
-
SHA512
a95c23a68421ef6946f6df4d628e1b6b19b6e20ff63b3bd360f6084bc3e4b4684824f2f92b9cfa30fa362eca8bd255ce89496f600eb4dde6d47bb2e974972f8b
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX5:7wqd87V5
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2552-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2552 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28 PID 2792 wrote to memory of 2552 2792 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e56a9c5e4f5f672fe12d029507bcf9e39e81640579eafe91b2114f1aa3adefb9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e56a9c5e4f5f672fe12d029507bcf9e39e81640579eafe91b2114f1aa3adefb9.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2552
-