Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 06:45
Behavioral task
behavioral1
Sample
a423dce2a0f78a467a6eaede9b53b97ce40ff55ddfa1314545c4bf836c90198a.dll
Resource
win7-20241023-en
General
-
Target
a423dce2a0f78a467a6eaede9b53b97ce40ff55ddfa1314545c4bf836c90198a.dll
-
Size
899KB
-
MD5
4c80712dbddbca07474e10d87d425b53
-
SHA1
6314f7d879ec3880335d2759018ae695676bd981
-
SHA256
a423dce2a0f78a467a6eaede9b53b97ce40ff55ddfa1314545c4bf836c90198a
-
SHA512
6c808931e3a56bda0847dab83d3a436eca4c516b32c0b7a474fe15e9f7398fb5c00748fc3b86ffdd900d1149b219ff4affe667a5158891e762f56ee3fffaaac4
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXD:7wqd87VD
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2040-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2040 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1980 wrote to memory of 2040 1980 rundll32.exe rundll32.exe PID 1980 wrote to memory of 2040 1980 rundll32.exe rundll32.exe PID 1980 wrote to memory of 2040 1980 rundll32.exe rundll32.exe PID 1980 wrote to memory of 2040 1980 rundll32.exe rundll32.exe PID 1980 wrote to memory of 2040 1980 rundll32.exe rundll32.exe PID 1980 wrote to memory of 2040 1980 rundll32.exe rundll32.exe PID 1980 wrote to memory of 2040 1980 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a423dce2a0f78a467a6eaede9b53b97ce40ff55ddfa1314545c4bf836c90198a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a423dce2a0f78a467a6eaede9b53b97ce40ff55ddfa1314545c4bf836c90198a.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2040
-