Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 00:13
Behavioral task
behavioral1
Sample
e777cec5b6c1dcb90acdbd2695d06ad3614b27bd09c4783c3c2c2212f3376705.dll
Resource
win7-20241010-en
General
-
Target
e777cec5b6c1dcb90acdbd2695d06ad3614b27bd09c4783c3c2c2212f3376705.dll
-
Size
899KB
-
MD5
d232b1308cef1793e64372620512db55
-
SHA1
e65407492180384d0af503d94cc4843caa10f1c6
-
SHA256
e777cec5b6c1dcb90acdbd2695d06ad3614b27bd09c4783c3c2c2212f3376705
-
SHA512
fa5992c7241063b6d5ee38837bb473982804bc911d1d9f2abf2e024a131bbd8c686267dbc1eb9fdd4556a476d2a687975ccf3523ceba100d9c76b147cc0a3def
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXb:7wqd87Vb
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4188-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 4188 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4352 wrote to memory of 4188 4352 rundll32.exe rundll32.exe PID 4352 wrote to memory of 4188 4352 rundll32.exe rundll32.exe PID 4352 wrote to memory of 4188 4352 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e777cec5b6c1dcb90acdbd2695d06ad3614b27bd09c4783c3c2c2212f3376705.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e777cec5b6c1dcb90acdbd2695d06ad3614b27bd09c4783c3c2c2212f3376705.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4188
-