Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 18:05
Behavioral task
behavioral1
Sample
3e9a27ab25dd69d705b9aba6f1ca1b23cbee9b406b4d172c6d33cc5ea17b7408.dll
Resource
win7-20240903-en
General
-
Target
3e9a27ab25dd69d705b9aba6f1ca1b23cbee9b406b4d172c6d33cc5ea17b7408.dll
-
Size
899KB
-
MD5
b05ce714fe68b729eeb8370844071193
-
SHA1
ec7e48354104c64985f999c9d36195c63665c9f3
-
SHA256
3e9a27ab25dd69d705b9aba6f1ca1b23cbee9b406b4d172c6d33cc5ea17b7408
-
SHA512
0c1e58dc0a800df3322ae495858de3e00acd68b539cb64e327f75268ee48fda588d768bb7a058abd3bbb57bf73653606ee5eeed51e4b0395aafb5bc8e2b4c3ca
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXu:7wqd87Vu
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4384-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 4384 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4136 wrote to memory of 4384 4136 rundll32.exe rundll32.exe PID 4136 wrote to memory of 4384 4136 rundll32.exe rundll32.exe PID 4136 wrote to memory of 4384 4136 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e9a27ab25dd69d705b9aba6f1ca1b23cbee9b406b4d172c6d33cc5ea17b7408.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e9a27ab25dd69d705b9aba6f1ca1b23cbee9b406b4d172c6d33cc5ea17b7408.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4384
-