Analysis
-
max time kernel
164s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 17:53
Behavioral task
behavioral1
Sample
6ceeb1ed827c69d3f0370a9eeca7428be6e1fedbc27fe29f772eb6028d152319.dll
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
General
-
Target
6ceeb1ed827c69d3f0370a9eeca7428be6e1fedbc27fe29f772eb6028d152319.dll
-
Size
94KB
-
MD5
8272ad4deed4311565a04ca13e26d8c6
-
SHA1
154263be6e150d8565b3db7e7d24fc30a93f9e60
-
SHA256
6ceeb1ed827c69d3f0370a9eeca7428be6e1fedbc27fe29f772eb6028d152319
-
SHA512
4350de006bfc2d8c6ed77a096f6a0545a159c59b67e2864c59f0826322d5327a485b6054b4fed5cc7589b83a70385510d94c518ddaf106c67bc9a0cab1b293ae
-
SSDEEP
1536:FPU/q1TDnXo7vRAI9k1Lcd/nRLie+ccSpJfDJAp2ycnSr6hK:FPU/qxXo7iI9uLcxUe+nSpJDJA7cnS2h
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4060-133-0x0000000010000000-0x000000001001A000-memory.dmp family_gh0strat -
Program crash 1 IoCs
pid pid_target Process procid_target 740 4060 WerFault.exe 80 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4060 4704 rundll32.exe 80 PID 4704 wrote to memory of 4060 4704 rundll32.exe 80 PID 4704 wrote to memory of 4060 4704 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ceeb1ed827c69d3f0370a9eeca7428be6e1fedbc27fe29f772eb6028d152319.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ceeb1ed827c69d3f0370a9eeca7428be6e1fedbc27fe29f772eb6028d152319.dll,#12⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 6603⤵
- Program crash
PID:740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4060 -ip 40601⤵PID:2128