Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 20:48
Behavioral task
behavioral1
Sample
4484e4b58bd8ff61163d6b7577874a4766e83777dff63ee2d9dde703443c0f14.dll
Resource
win7-20241010-en
General
-
Target
4484e4b58bd8ff61163d6b7577874a4766e83777dff63ee2d9dde703443c0f14.dll
-
Size
899KB
-
MD5
1064fb9f5f38e605381e5866b38db8aa
-
SHA1
b9d81998a0d1d801624d05ebc20a7c764d60e420
-
SHA256
4484e4b58bd8ff61163d6b7577874a4766e83777dff63ee2d9dde703443c0f14
-
SHA512
a0ddc712b9c5260864cf85ca40314dc4f18602ad426925a743b78f9572d44577d45c40691150cfbb2bce9f400ef603564b55905c625e83dd410ff61e1054b4dc
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXi:7wqd87Vi
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2352-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2352 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1672 wrote to memory of 2352 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2352 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2352 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2352 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2352 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2352 1672 rundll32.exe rundll32.exe PID 1672 wrote to memory of 2352 1672 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4484e4b58bd8ff61163d6b7577874a4766e83777dff63ee2d9dde703443c0f14.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4484e4b58bd8ff61163d6b7577874a4766e83777dff63ee2d9dde703443c0f14.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2352
-