Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:48
Behavioral task
behavioral1
Sample
11303399e0065335e08be4f5bc6486210e76488d44506f938db28635e013f0b2.dll
Resource
win7-20241010-en
General
-
Target
11303399e0065335e08be4f5bc6486210e76488d44506f938db28635e013f0b2.dll
-
Size
899KB
-
MD5
61dab720ceee4491a279a79c4dec8435
-
SHA1
4f70ae01cf975c607c35346d44c4eaa85dbad006
-
SHA256
11303399e0065335e08be4f5bc6486210e76488d44506f938db28635e013f0b2
-
SHA512
c8d9db4c09931f55c5b20a8421a66ec6e247885307431956fb56be62826508197880ab28116d31272d0e64ebc769ac727514d4e8003e0736cea7e993f84605a0
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXG:7wqd87VG
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4832-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 4832 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3840 wrote to memory of 4832 3840 rundll32.exe rundll32.exe PID 3840 wrote to memory of 4832 3840 rundll32.exe rundll32.exe PID 3840 wrote to memory of 4832 3840 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11303399e0065335e08be4f5bc6486210e76488d44506f938db28635e013f0b2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11303399e0065335e08be4f5bc6486210e76488d44506f938db28635e013f0b2.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4832
-