Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2025, 01:34
General
-
Target
3c195697922279fd6da7413269738cce91b92fe9f74849f37e31636cec950d41.dll
-
Size
899KB
-
MD5
aeb8436a921f4c6f2f4519a1a1334c7d
-
SHA1
1a3d96313f2394f0e6076f876caa05be6e71e9bc
-
SHA256
3c195697922279fd6da7413269738cce91b92fe9f74849f37e31636cec950d41
-
SHA512
fbf4eedaaeccfae0121ad6c0a6efc70e1638a127a8c461574550d77fbfe97ee6af7ff8fa42f1c1994bf8f8a528c9c0651b8552274237a7c20eda74a3aee7bfa2
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX5:7wqd87V5
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2216-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2216 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2216 2624 rundll32.exe 87 PID 2624 wrote to memory of 2216 2624 rundll32.exe 87 PID 2624 wrote to memory of 2216 2624 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c195697922279fd6da7413269738cce91b92fe9f74849f37e31636cec950d41.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c195697922279fd6da7413269738cce91b92fe9f74849f37e31636cec950d41.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2216
-