Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 20:45
Behavioral task
behavioral1
Sample
4484e4b58bd8ff61163d6b7577874a4766e83777dff63ee2d9dde703443c0f14.dll
Resource
win7-20240903-en
General
-
Target
4484e4b58bd8ff61163d6b7577874a4766e83777dff63ee2d9dde703443c0f14.dll
-
Size
899KB
-
MD5
1064fb9f5f38e605381e5866b38db8aa
-
SHA1
b9d81998a0d1d801624d05ebc20a7c764d60e420
-
SHA256
4484e4b58bd8ff61163d6b7577874a4766e83777dff63ee2d9dde703443c0f14
-
SHA512
a0ddc712b9c5260864cf85ca40314dc4f18602ad426925a743b78f9572d44577d45c40691150cfbb2bce9f400ef603564b55905c625e83dd410ff61e1054b4dc
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXi:7wqd87Vi
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1844-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 1844 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3332 wrote to memory of 1844 3332 rundll32.exe rundll32.exe PID 3332 wrote to memory of 1844 3332 rundll32.exe rundll32.exe PID 3332 wrote to memory of 1844 3332 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4484e4b58bd8ff61163d6b7577874a4766e83777dff63ee2d9dde703443c0f14.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4484e4b58bd8ff61163d6b7577874a4766e83777dff63ee2d9dde703443c0f14.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1844
-