Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 06:41
Behavioral task
behavioral1
Sample
416c6b92e580ed86599bf7cde2f6b0da37f69ecd536b35a691dfa8161396ec3d.dll
Resource
win7-20241023-en
General
-
Target
416c6b92e580ed86599bf7cde2f6b0da37f69ecd536b35a691dfa8161396ec3d.dll
-
Size
51KB
-
MD5
cf1f315686db4694f5e6314139c1f374
-
SHA1
2589183f93037594fc619efb31779dc452806c49
-
SHA256
416c6b92e580ed86599bf7cde2f6b0da37f69ecd536b35a691dfa8161396ec3d
-
SHA512
1d34d896633712f463b320fa825daedf57b3ac92a3e58abc6aaf8c7912ee0d401c8903bbcbc4f470c2d6f78cd74acc25b5a33b00b80fec64d8546e6c462de64d
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLIJYH5:1dWubF3n9S91BF3fboUJYH5
Malware Config
Extracted
gh0strat
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4188-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 4188 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3828 wrote to memory of 4188 3828 rundll32.exe rundll32.exe PID 3828 wrote to memory of 4188 3828 rundll32.exe rundll32.exe PID 3828 wrote to memory of 4188 3828 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\416c6b92e580ed86599bf7cde2f6b0da37f69ecd536b35a691dfa8161396ec3d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\416c6b92e580ed86599bf7cde2f6b0da37f69ecd536b35a691dfa8161396ec3d.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4188
-