Analysis
-
max time kernel
154s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 17:13
Behavioral task
behavioral1
Sample
050c2361ce391cd740630c8dbad6a009cbb694f6bdd05007afcac9f89705bb2e.dll
Resource
win7-20230831-en
3 signatures
150 seconds
General
-
Target
050c2361ce391cd740630c8dbad6a009cbb694f6bdd05007afcac9f89705bb2e.dll
-
Size
10.3MB
-
MD5
77b4aeed986e8cbdcd8ea4928a99e080
-
SHA1
3df155ea5047ecc1cb01f841714257ee766e87dd
-
SHA256
050c2361ce391cd740630c8dbad6a009cbb694f6bdd05007afcac9f89705bb2e
-
SHA512
735fe0a537e24ab121c3a62b276491166a4d22d9ef4762fed76204864872be299e013499ee988dae7269ec79c8a677dfcd7347f42e6211586e2a50cd8da228bb
-
SSDEEP
3072:Anc+NDagQWf2VBEOQqFCabxYgKnc+NDagQWf2VBEOQqFCabxYge/:mZkucETMCJHZkucETMCJn
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2928-0-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat behavioral1/memory/2928-1-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat behavioral1/memory/2928-2-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat behavioral1/memory/2928-3-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2928 2408 rundll32.exe 28 PID 2408 wrote to memory of 2928 2408 rundll32.exe 28 PID 2408 wrote to memory of 2928 2408 rundll32.exe 28 PID 2408 wrote to memory of 2928 2408 rundll32.exe 28 PID 2408 wrote to memory of 2928 2408 rundll32.exe 28 PID 2408 wrote to memory of 2928 2408 rundll32.exe 28 PID 2408 wrote to memory of 2928 2408 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\050c2361ce391cd740630c8dbad6a009cbb694f6bdd05007afcac9f89705bb2e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\050c2361ce391cd740630c8dbad6a009cbb694f6bdd05007afcac9f89705bb2e.dll,#12⤵PID:2928
-