Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 18:03
Behavioral task
behavioral1
Sample
379d5a7178b4dd2b855a5a95505170f75118e6a1313cac74628147e6a797ed74.dll
Resource
win7-20241023-en
General
-
Target
379d5a7178b4dd2b855a5a95505170f75118e6a1313cac74628147e6a797ed74.dll
-
Size
899KB
-
MD5
ed71bca1b1c9075a8d42b13628d349ad
-
SHA1
79422238723c4022ba789a78b0ff84d2c40e7517
-
SHA256
379d5a7178b4dd2b855a5a95505170f75118e6a1313cac74628147e6a797ed74
-
SHA512
7e5e0c3a4dc27af7ab9893e1dab26cfdcdbdd4106b1bb40a58d5b4fc2c3bbe95d5aca1cf839be9c1ab4e2d469524764a051c97da4cc579cd33a6413f353f55d0
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXf:7wqd87Vf
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3996-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 3996 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 444 wrote to memory of 3996 444 rundll32.exe rundll32.exe PID 444 wrote to memory of 3996 444 rundll32.exe rundll32.exe PID 444 wrote to memory of 3996 444 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\379d5a7178b4dd2b855a5a95505170f75118e6a1313cac74628147e6a797ed74.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\379d5a7178b4dd2b855a5a95505170f75118e6a1313cac74628147e6a797ed74.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3996
-