Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:54
Behavioral task
behavioral1
Sample
5c1702d57e5f718e05b7eaf1b08ceebb1b9f67e1401ba3655b4bfcfea8f22c70.dll
Resource
win7-20240903-en
General
-
Target
5c1702d57e5f718e05b7eaf1b08ceebb1b9f67e1401ba3655b4bfcfea8f22c70.dll
-
Size
899KB
-
MD5
10dfbf5d7d2ed0ca03441e765e0bfce6
-
SHA1
450469a2d845d43e89e9758f2f4bd720d186e397
-
SHA256
5c1702d57e5f718e05b7eaf1b08ceebb1b9f67e1401ba3655b4bfcfea8f22c70
-
SHA512
6fab36454f61e884d64518976144922c10fac2aa06bb6fecfbe47c8dc280a973543e557854790cbe6fc4968f4de47b53c01fd6c0b8a407a67736755842a68d3f
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXI:7wqd87VI
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1240-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 1240 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3132 wrote to memory of 1240 3132 rundll32.exe rundll32.exe PID 3132 wrote to memory of 1240 3132 rundll32.exe rundll32.exe PID 3132 wrote to memory of 1240 3132 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c1702d57e5f718e05b7eaf1b08ceebb1b9f67e1401ba3655b4bfcfea8f22c70.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c1702d57e5f718e05b7eaf1b08ceebb1b9f67e1401ba3655b4bfcfea8f22c70.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1240
-