Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 14:52
Behavioral task
behavioral1
Sample
6a1069695546a9e0e2ad0ab1f489fd78372de57dcac480c6ea7e03368682764d.dll
Resource
win7-20240903-en
General
-
Target
6a1069695546a9e0e2ad0ab1f489fd78372de57dcac480c6ea7e03368682764d.dll
-
Size
51KB
-
MD5
5f6b0d6994ba8e7e6e220f846c4c1ed1
-
SHA1
87c7abb11c5d8676cf338be2678d02427219c1b4
-
SHA256
6a1069695546a9e0e2ad0ab1f489fd78372de57dcac480c6ea7e03368682764d
-
SHA512
7debf4b1f07bd48e0bde3b21311c908d16978545d625b77ce800f23f31012b6fa84291103fb9860c9147ed617dc709f8f3fa3d0c64dbf3c643a6e4f33b5dbf60
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLpJYH5:1dWubF3n9S91BF3fbo1JYH5
Malware Config
Extracted
gh0strat
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2612-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2612 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4052 wrote to memory of 2612 4052 rundll32.exe rundll32.exe PID 4052 wrote to memory of 2612 4052 rundll32.exe rundll32.exe PID 4052 wrote to memory of 2612 4052 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a1069695546a9e0e2ad0ab1f489fd78372de57dcac480c6ea7e03368682764d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a1069695546a9e0e2ad0ab1f489fd78372de57dcac480c6ea7e03368682764d.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2612
-