Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 17:03
Behavioral task
behavioral1
Sample
e749ae88467ccfdd8dcb7df8e1e4a81ddf655b8ca26d5dd13005040ab7052e26.dll
Resource
win7-20241023-en
General
-
Target
e749ae88467ccfdd8dcb7df8e1e4a81ddf655b8ca26d5dd13005040ab7052e26.dll
-
Size
899KB
-
MD5
e958788b318ec0a1b7cbbb39fef444c7
-
SHA1
cf16c14bddc0e10443e19e65de98f3f46b8a1673
-
SHA256
e749ae88467ccfdd8dcb7df8e1e4a81ddf655b8ca26d5dd13005040ab7052e26
-
SHA512
8fe0113a2b80661de1af651bd5b15546d7e2d042d96d4f6aa4c0880c02dd7be0fb0baf161a650c36455d38f0107a31824afe959a10dc14aa5f2b00187a8af01f
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXt:7wqd87Vt
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1788-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 1788 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1272 wrote to memory of 1788 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1788 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1788 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1788 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1788 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1788 1272 rundll32.exe rundll32.exe PID 1272 wrote to memory of 1788 1272 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e749ae88467ccfdd8dcb7df8e1e4a81ddf655b8ca26d5dd13005040ab7052e26.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e749ae88467ccfdd8dcb7df8e1e4a81ddf655b8ca26d5dd13005040ab7052e26.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1788
-