Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 06:41
Behavioral task
behavioral1
Sample
416c6b92e580ed86599bf7cde2f6b0da37f69ecd536b35a691dfa8161396ec3d.dll
Resource
win7-20241023-en
General
-
Target
416c6b92e580ed86599bf7cde2f6b0da37f69ecd536b35a691dfa8161396ec3d.dll
-
Size
51KB
-
MD5
cf1f315686db4694f5e6314139c1f374
-
SHA1
2589183f93037594fc619efb31779dc452806c49
-
SHA256
416c6b92e580ed86599bf7cde2f6b0da37f69ecd536b35a691dfa8161396ec3d
-
SHA512
1d34d896633712f463b320fa825daedf57b3ac92a3e58abc6aaf8c7912ee0d401c8903bbcbc4f470c2d6f78cd74acc25b5a33b00b80fec64d8546e6c462de64d
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLIJYH5:1dWubF3n9S91BF3fboUJYH5
Malware Config
Extracted
gh0strat
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2172-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2172 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2264 wrote to memory of 2172 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 2172 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 2172 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 2172 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 2172 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 2172 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 2172 2264 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\416c6b92e580ed86599bf7cde2f6b0da37f69ecd536b35a691dfa8161396ec3d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\416c6b92e580ed86599bf7cde2f6b0da37f69ecd536b35a691dfa8161396ec3d.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2172
-