Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 20:59
Behavioral task
behavioral1
Sample
85473b032585780e94f83b9b3125c92e77f0d301005135e3cb00100a3f85dabd.dll
Resource
win7-20240903-en
General
-
Target
85473b032585780e94f83b9b3125c92e77f0d301005135e3cb00100a3f85dabd.dll
-
Size
899KB
-
MD5
2f53b3d60a626f8d5b240221578f4faa
-
SHA1
c845b1d821a6b7e556ceef95c68f2db862816162
-
SHA256
85473b032585780e94f83b9b3125c92e77f0d301005135e3cb00100a3f85dabd
-
SHA512
d6796dd63511057a3cb995182be25457dd5d0ff3314ca55939c99acc564982f1c3566dc97d4799ac9b11dece62218c2db6b7e22adc4645eb263feebb1233c809
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXL:7wqd87VL
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 1708 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 580 wrote to memory of 1708 580 rundll32.exe rundll32.exe PID 580 wrote to memory of 1708 580 rundll32.exe rundll32.exe PID 580 wrote to memory of 1708 580 rundll32.exe rundll32.exe PID 580 wrote to memory of 1708 580 rundll32.exe rundll32.exe PID 580 wrote to memory of 1708 580 rundll32.exe rundll32.exe PID 580 wrote to memory of 1708 580 rundll32.exe rundll32.exe PID 580 wrote to memory of 1708 580 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85473b032585780e94f83b9b3125c92e77f0d301005135e3cb00100a3f85dabd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85473b032585780e94f83b9b3125c92e77f0d301005135e3cb00100a3f85dabd.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1708
-