Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 02:24
Behavioral task
behavioral1
Sample
45c16a5410e9c3a1dedd6da4ed2646f94c4f83f77a1bc6f853ad918c7e973285.dll
Resource
win7-20250207-en
6 signatures
150 seconds
General
-
Target
45c16a5410e9c3a1dedd6da4ed2646f94c4f83f77a1bc6f853ad918c7e973285.dll
-
Size
49KB
-
MD5
e9c4767c501d6115eb25c0612a469c44
-
SHA1
7e35923a8d5d4aa0dab05ba2bf84be27855997d5
-
SHA256
45c16a5410e9c3a1dedd6da4ed2646f94c4f83f77a1bc6f853ad918c7e973285
-
SHA512
e577ff640838fdddde5c5d1cd6d87972c93a48f94c429f26948399a9ba9cccfee8077304d1711d560f0112e3ecc84a77831f5b5a38c618022c51ea8b0992ce13
-
SSDEEP
1536:CDwMsml26T5zBj+alf1H9jfbyqkY4ZvoDUb/gJOxJYHB9ElHS:Cn7zBjPp1H9ovoDa/gJCJYHBWZS
Malware Config
Extracted
Family
gh0strat
C2
cf1549064127.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4088-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4088 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4088 4004 rundll32.exe 86 PID 4004 wrote to memory of 4088 4004 rundll32.exe 86 PID 4004 wrote to memory of 4088 4004 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45c16a5410e9c3a1dedd6da4ed2646f94c4f83f77a1bc6f853ad918c7e973285.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\45c16a5410e9c3a1dedd6da4ed2646f94c4f83f77a1bc6f853ad918c7e973285.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4088
-