Analysis
-
max time kernel
144s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 09:44
Behavioral task
behavioral1
Sample
3a768a56e81a3b7eef6ee3561791224e39af334e4cff85afd0a84178874c0fc9.dll
Resource
win7-20221111-en
windows7-x64
1 signatures
150 seconds
General
-
Target
3a768a56e81a3b7eef6ee3561791224e39af334e4cff85afd0a84178874c0fc9.dll
-
Size
152KB
-
MD5
3f171fbb1e271a794da0858edb26e6f0
-
SHA1
6484d42d8eb042914e9e02500a67b7d69df792ba
-
SHA256
3a768a56e81a3b7eef6ee3561791224e39af334e4cff85afd0a84178874c0fc9
-
SHA512
1a4d9e302e07210a51acb926ed488b4f7c25419ada668c35c00ae807b31396c6e413269574b7e0e886dc12af6a9eaf228807ddad78b819a95ebe9444177698f6
-
SSDEEP
3072:eUeaqfGUZw7WPVHQpV0UjOhAWvf9QhSTmTTBftSha8VOjJ:waOA+GpV0UMAWvf9QhSTmTTBlSha8
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1316-133-0x0000000010000000-0x0000000010028000-memory.dmp family_gh0strat -
Program crash 1 IoCs
pid pid_target Process procid_target 1516 1316 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4412 wrote to memory of 1316 4412 rundll32.exe 84 PID 4412 wrote to memory of 1316 4412 rundll32.exe 84 PID 4412 wrote to memory of 1316 4412 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a768a56e81a3b7eef6ee3561791224e39af334e4cff85afd0a84178874c0fc9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a768a56e81a3b7eef6ee3561791224e39af334e4cff85afd0a84178874c0fc9.dll,#12⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 5883⤵
- Program crash
PID:1516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1316 -ip 13161⤵PID:1692