Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 06:45
Behavioral task
behavioral1
Sample
a423dce2a0f78a467a6eaede9b53b97ce40ff55ddfa1314545c4bf836c90198a.dll
Resource
win7-20241023-en
General
-
Target
a423dce2a0f78a467a6eaede9b53b97ce40ff55ddfa1314545c4bf836c90198a.dll
-
Size
899KB
-
MD5
4c80712dbddbca07474e10d87d425b53
-
SHA1
6314f7d879ec3880335d2759018ae695676bd981
-
SHA256
a423dce2a0f78a467a6eaede9b53b97ce40ff55ddfa1314545c4bf836c90198a
-
SHA512
6c808931e3a56bda0847dab83d3a436eca4c516b32c0b7a474fe15e9f7398fb5c00748fc3b86ffdd900d1149b219ff4affe667a5158891e762f56ee3fffaaac4
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXD:7wqd87VD
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2652-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2652 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3592 wrote to memory of 2652 3592 rundll32.exe rundll32.exe PID 3592 wrote to memory of 2652 3592 rundll32.exe rundll32.exe PID 3592 wrote to memory of 2652 3592 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a423dce2a0f78a467a6eaede9b53b97ce40ff55ddfa1314545c4bf836c90198a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a423dce2a0f78a467a6eaede9b53b97ce40ff55ddfa1314545c4bf836c90198a.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2652
-