Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 00:05
Behavioral task
behavioral1
Sample
29dafc47dca9b0268af8cfa1c99555029b707d20132e56fac9e232756797975d.dll
Resource
win7-20240903-en
General
-
Target
29dafc47dca9b0268af8cfa1c99555029b707d20132e56fac9e232756797975d.dll
-
Size
51KB
-
MD5
b1102693270a2171a6cf5dfe08c883a4
-
SHA1
58694b62390e1cac5ed14b9e3afcbf8166ef0d75
-
SHA256
29dafc47dca9b0268af8cfa1c99555029b707d20132e56fac9e232756797975d
-
SHA512
ff43fdb7054fb3f2c8047cf5594a26e176a61398bbe4f2948063b260bf03d97e712232b03bf33e52182372bb909d49afb0c807695a65545cf67e6463b1fb9293
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL3JYH5:1dWubF3n9S91BF3fborJYH5
Malware Config
Extracted
gh0strat
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2520-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2520 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1112 wrote to memory of 2520 1112 rundll32.exe rundll32.exe PID 1112 wrote to memory of 2520 1112 rundll32.exe rundll32.exe PID 1112 wrote to memory of 2520 1112 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\29dafc47dca9b0268af8cfa1c99555029b707d20132e56fac9e232756797975d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\29dafc47dca9b0268af8cfa1c99555029b707d20132e56fac9e232756797975d.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2520
-