Analysis
-
max time kernel
140s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 09:41
Behavioral task
behavioral1
Sample
55e67a06a2d2a506c47412fe55fb0d999c9870a4ddde8e490e0f7063701be25c.dll
Resource
win7-20240729-en
6 signatures
150 seconds
General
-
Target
55e67a06a2d2a506c47412fe55fb0d999c9870a4ddde8e490e0f7063701be25c.dll
-
Size
899KB
-
MD5
49d5fdbdc6c0a4c6ddd9a77e5c6eb265
-
SHA1
089e77bfd4589b4f2ff5deffd5ef912ca98ed90d
-
SHA256
55e67a06a2d2a506c47412fe55fb0d999c9870a4ddde8e490e0f7063701be25c
-
SHA512
4e94ff11273785aabc343572024db8c7a4c685162268517db7d6c7276bee77381c63ae5bf86119b10788a9e2b9aeb0e390255434930c8816dc6c5594e61785fd
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXF:7wqd87VF
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2328-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2328 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2328 3052 rundll32.exe 30 PID 3052 wrote to memory of 2328 3052 rundll32.exe 30 PID 3052 wrote to memory of 2328 3052 rundll32.exe 30 PID 3052 wrote to memory of 2328 3052 rundll32.exe 30 PID 3052 wrote to memory of 2328 3052 rundll32.exe 30 PID 3052 wrote to memory of 2328 3052 rundll32.exe 30 PID 3052 wrote to memory of 2328 3052 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\55e67a06a2d2a506c47412fe55fb0d999c9870a4ddde8e490e0f7063701be25c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\55e67a06a2d2a506c47412fe55fb0d999c9870a4ddde8e490e0f7063701be25c.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2328
-