Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 02:11
Behavioral task
behavioral1
Sample
8d50fb6038c692bee2e6ada2b699e5d79f5732c04e8ee4cca925a3350ce0a3f0.dll
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
8d50fb6038c692bee2e6ada2b699e5d79f5732c04e8ee4cca925a3350ce0a3f0.dll
-
Size
49KB
-
MD5
fa9f90699e786307cd36b6daedfbcafb
-
SHA1
048293cf90df6ae0d43e7fa85c69337676fc7c6d
-
SHA256
8d50fb6038c692bee2e6ada2b699e5d79f5732c04e8ee4cca925a3350ce0a3f0
-
SHA512
260970124f38852fe4c62b4108ac4f5da46113361f5c2dee4385cd80b81701ea8e4cce60c0cc0af7c7ce887c43a600ddf287ba753530c20df9c640ca21d9af1f
-
SSDEEP
1536:CDwMsml26T5zBj+alf1H9jfbyqkY4ZvoDUb/gJOSJYHB9ElHS:Cn7zBjPp1H9ovoDa/gJ5JYHBWZS
Malware Config
Extracted
Family
gh0strat
C2
cf1549064127.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/448-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 448 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1620 wrote to memory of 448 1620 rundll32.exe 84 PID 1620 wrote to memory of 448 1620 rundll32.exe 84 PID 1620 wrote to memory of 448 1620 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d50fb6038c692bee2e6ada2b699e5d79f5732c04e8ee4cca925a3350ce0a3f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d50fb6038c692bee2e6ada2b699e5d79f5732c04e8ee4cca925a3350ce0a3f0.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:448
-