Analysis
-
max time kernel
81s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 05:55
Behavioral task
behavioral1
Sample
24e103dc1741236784f0a58391f8226ed7afd25d7868e16ebcbdbe045fe04fee.dll
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
24e103dc1741236784f0a58391f8226ed7afd25d7868e16ebcbdbe045fe04fee.dll
-
Size
94KB
-
MD5
933da59d3e914f4137e80f8e169c5f8d
-
SHA1
5e12339cd9b7b37f240face4e1a9d3a698dd0eca
-
SHA256
24e103dc1741236784f0a58391f8226ed7afd25d7868e16ebcbdbe045fe04fee
-
SHA512
d7e35a6170a64b86b478608c1e48b8e95e9953005749a06ceeb07ed790843a1ddd6d5eccfd63cb7efefb92453fd81b81d498b92b885d295f77c32dc3b42e024a
-
SSDEEP
1536:FPU/q1TDnXo7vRAI9k1Lcd/nLLie+ccSpJfDJAp2ycnSr6hK:FPU/qxXo7iI9uLcxye+nSpJDJA7cnS2h
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3808-133-0x0000000010000000-0x000000001001A000-memory.dmp family_gh0strat behavioral2/memory/3808-134-0x0000000010000000-0x000000001001A000-memory.dmp family_gh0strat -
Program crash 1 IoCs
pid pid_target Process procid_target 2164 3808 WerFault.exe 79 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3808 5036 rundll32.exe 79 PID 5036 wrote to memory of 3808 5036 rundll32.exe 79 PID 5036 wrote to memory of 3808 5036 rundll32.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24e103dc1741236784f0a58391f8226ed7afd25d7868e16ebcbdbe045fe04fee.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\24e103dc1741236784f0a58391f8226ed7afd25d7868e16ebcbdbe045fe04fee.dll,#12⤵PID:3808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 6603⤵
- Program crash
PID:2164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3808 -ip 38081⤵PID:1964