Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 12:45
Behavioral task
behavioral1
Sample
781c3105b1a10dd4aea9b58647df02d3148727e01360c75d45ebbc9141f61693.dll
Resource
win7-20240903-en
General
-
Target
781c3105b1a10dd4aea9b58647df02d3148727e01360c75d45ebbc9141f61693.dll
-
Size
51KB
-
MD5
09f6e4cb2770dd97247049b89aad8414
-
SHA1
d28e2b91bcdbd4053a14cd29badf8591a6049b34
-
SHA256
781c3105b1a10dd4aea9b58647df02d3148727e01360c75d45ebbc9141f61693
-
SHA512
dc0e39e9faa6dcc8e288fec73761422d03181dab2a712c1546fd5a4dab46f12ca3a8a269440979a3ae5b420d7701a2e2a4e0755b9afafd11a083e6177b1f1fb3
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL+UJYH5:1dWubF3n9S91BF3fbo/JYH5
Malware Config
Extracted
gh0strat
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2400-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2400 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2068 wrote to memory of 2400 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 2400 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 2400 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 2400 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 2400 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 2400 2068 rundll32.exe rundll32.exe PID 2068 wrote to memory of 2400 2068 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\781c3105b1a10dd4aea9b58647df02d3148727e01360c75d45ebbc9141f61693.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\781c3105b1a10dd4aea9b58647df02d3148727e01360c75d45ebbc9141f61693.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2400
-