Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 02:54
Behavioral task
behavioral1
Sample
5c1702d57e5f718e05b7eaf1b08ceebb1b9f67e1401ba3655b4bfcfea8f22c70.dll
Resource
win7-20240903-en
General
-
Target
5c1702d57e5f718e05b7eaf1b08ceebb1b9f67e1401ba3655b4bfcfea8f22c70.dll
-
Size
899KB
-
MD5
10dfbf5d7d2ed0ca03441e765e0bfce6
-
SHA1
450469a2d845d43e89e9758f2f4bd720d186e397
-
SHA256
5c1702d57e5f718e05b7eaf1b08ceebb1b9f67e1401ba3655b4bfcfea8f22c70
-
SHA512
6fab36454f61e884d64518976144922c10fac2aa06bb6fecfbe47c8dc280a973543e557854790cbe6fc4968f4de47b53c01fd6c0b8a407a67736755842a68d3f
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXI:7wqd87VI
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2384-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2384 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1732 wrote to memory of 2384 1732 rundll32.exe rundll32.exe PID 1732 wrote to memory of 2384 1732 rundll32.exe rundll32.exe PID 1732 wrote to memory of 2384 1732 rundll32.exe rundll32.exe PID 1732 wrote to memory of 2384 1732 rundll32.exe rundll32.exe PID 1732 wrote to memory of 2384 1732 rundll32.exe rundll32.exe PID 1732 wrote to memory of 2384 1732 rundll32.exe rundll32.exe PID 1732 wrote to memory of 2384 1732 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c1702d57e5f718e05b7eaf1b08ceebb1b9f67e1401ba3655b4bfcfea8f22c70.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c1702d57e5f718e05b7eaf1b08ceebb1b9f67e1401ba3655b4bfcfea8f22c70.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2384
-