Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 09:54
Behavioral task
behavioral1
Sample
fd6eeabd8c2f1920ced6cdd9922a928872312dba8b0404f3d6ca8b5d0c5cc1c2.dll
Resource
win7-20240903-en
General
-
Target
fd6eeabd8c2f1920ced6cdd9922a928872312dba8b0404f3d6ca8b5d0c5cc1c2.dll
-
Size
899KB
-
MD5
5f63dea8964b0b27564366d0f982df98
-
SHA1
2106f0a670ae442e419b7b6b497159d4f5b64733
-
SHA256
fd6eeabd8c2f1920ced6cdd9922a928872312dba8b0404f3d6ca8b5d0c5cc1c2
-
SHA512
5214241e60a7affc8c7f724316af1b2d74ff18bd93c12c0e37c31be99af9891f11b36ce65d6bdb7040d7851e5596668f8e75474d660467d42dc46218ac663125
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX4:7wqd87V4
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2296-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2296 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2060 wrote to memory of 2296 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2296 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2296 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2296 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2296 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2296 2060 rundll32.exe rundll32.exe PID 2060 wrote to memory of 2296 2060 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd6eeabd8c2f1920ced6cdd9922a928872312dba8b0404f3d6ca8b5d0c5cc1c2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd6eeabd8c2f1920ced6cdd9922a928872312dba8b0404f3d6ca8b5d0c5cc1c2.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2296
-