Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 23:47
Behavioral task
behavioral1
Sample
d28e9140c4a1a2652f7375b1a3dac46f5aa4499720088ee279fa17f33c625929.dll
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
d28e9140c4a1a2652f7375b1a3dac46f5aa4499720088ee279fa17f33c625929.dll
-
Size
899KB
-
MD5
8950325f9f63d613e8e9e569da10e365
-
SHA1
f88bf73addab14bc82166f51cd62a0a915db412b
-
SHA256
d28e9140c4a1a2652f7375b1a3dac46f5aa4499720088ee279fa17f33c625929
-
SHA512
53e47481cee45ccb379e3582e0e88622806b5486e4bdebadf202555cd26125a21bd916c2f2a706e11b28065a43506ec2d93b36d3a1f8cb116b8f70d0bf8726a8
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXQ:7wqd87VQ
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1096-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1096 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1096 5072 rundll32.exe 83 PID 5072 wrote to memory of 1096 5072 rundll32.exe 83 PID 5072 wrote to memory of 1096 5072 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d28e9140c4a1a2652f7375b1a3dac46f5aa4499720088ee279fa17f33c625929.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d28e9140c4a1a2652f7375b1a3dac46f5aa4499720088ee279fa17f33c625929.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1096
-