Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 20:45
Behavioral task
behavioral1
Sample
dd467cc2fb13427c759b4478dd7c6480a8ad1dce88fadfc7afabc9248fb9ee0e.dll
Resource
win7-20240903-en
General
-
Target
dd467cc2fb13427c759b4478dd7c6480a8ad1dce88fadfc7afabc9248fb9ee0e.dll
-
Size
899KB
-
MD5
d1a60da03bd1c05564fb1a9d596af1f7
-
SHA1
e48bf44eb8929282c03a35888d773453cb047298
-
SHA256
dd467cc2fb13427c759b4478dd7c6480a8ad1dce88fadfc7afabc9248fb9ee0e
-
SHA512
6e94a5a1f842971c304d8f8746b2e1a70190d49282bcb1bda819b3d963d6f02afe6b074a7c72d3e124e01813deabdeb2661f226df6841fcf9a774294437e56fd
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX9:7wqd87V9
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3168-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 3168 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3928 wrote to memory of 3168 3928 rundll32.exe rundll32.exe PID 3928 wrote to memory of 3168 3928 rundll32.exe rundll32.exe PID 3928 wrote to memory of 3168 3928 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dd467cc2fb13427c759b4478dd7c6480a8ad1dce88fadfc7afabc9248fb9ee0e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dd467cc2fb13427c759b4478dd7c6480a8ad1dce88fadfc7afabc9248fb9ee0e.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3168
-