Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 18:42
Behavioral task
behavioral1
Sample
d32b8b8f3d7aeea45dd7b3037623b5ed870fc1793fab035f4c5cd247da9f900f.dll
Resource
win7-20241010-en
General
-
Target
d32b8b8f3d7aeea45dd7b3037623b5ed870fc1793fab035f4c5cd247da9f900f.dll
-
Size
899KB
-
MD5
ea19393d82f60f7b6db013c04c3de24e
-
SHA1
cac1dfe9e26f46390e8c09a4a9a2d109096671ed
-
SHA256
d32b8b8f3d7aeea45dd7b3037623b5ed870fc1793fab035f4c5cd247da9f900f
-
SHA512
bb15ac241fb9c42fd9aabab9fb774768d9a11b5deeba8efa00614bd6644d437239a44bb426f6dc04ae62284a15b610ca8f59a723d22f665f4f724a2f2e27ec5c
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXS:7wqd87VS
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2060-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2060 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1740 wrote to memory of 2060 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2060 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2060 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2060 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2060 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2060 1740 rundll32.exe rundll32.exe PID 1740 wrote to memory of 2060 1740 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d32b8b8f3d7aeea45dd7b3037623b5ed870fc1793fab035f4c5cd247da9f900f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d32b8b8f3d7aeea45dd7b3037623b5ed870fc1793fab035f4c5cd247da9f900f.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2060
-