Analysis
-
max time kernel
157s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 06:36
Behavioral task
behavioral1
Sample
d2ffa748dbec79695cb311d6c3fadf3182972db352d6c4d2ec1e036f726b3bdd.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
d2ffa748dbec79695cb311d6c3fadf3182972db352d6c4d2ec1e036f726b3bdd.dll
-
Size
148KB
-
MD5
f46f7f560dca4ccc2a54dba09a5f1066
-
SHA1
47812eaf11cd28352d9100b5a5a3491aad35c8b4
-
SHA256
d2ffa748dbec79695cb311d6c3fadf3182972db352d6c4d2ec1e036f726b3bdd
-
SHA512
51b03eb00e188fdd85d8f0a5ddd6c2743487d7d14fb538b9eff78f798017e646ac450dc679c25fbfba9c3012a018389e1b861350e3d29ca33d6b6c93b14062ed
-
SSDEEP
3072:ohPm77B1ZDwB76mVlZmFRqGd4PwcwMG5vY:kWd1ZDg7HqRqGywR5vY
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral1/memory/2704-3-0x0000000000400000-0x000000000040B000-memory.dmp family_gh0strat behavioral1/memory/2704-2-0x0000000000400000-0x000000000040B000-memory.dmp family_gh0strat behavioral1/memory/2704-6-0x0000000000400000-0x000000000040B000-memory.dmp family_gh0strat behavioral1/memory/2704-8-0x0000000000400000-0x000000000040B000-memory.dmp family_gh0strat behavioral1/memory/2704-9-0x0000000000400000-0x000000000040B000-memory.dmp family_gh0strat behavioral1/memory/2704-10-0x0000000000400000-0x000000000040B000-memory.dmp family_gh0strat behavioral1/memory/2704-11-0x0000000000400000-0x000000000040B000-memory.dmp family_gh0strat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2696 set thread context of 2704 2696 rundll32.exe 30 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2696 3008 rundll32.exe 29 PID 3008 wrote to memory of 2696 3008 rundll32.exe 29 PID 3008 wrote to memory of 2696 3008 rundll32.exe 29 PID 3008 wrote to memory of 2696 3008 rundll32.exe 29 PID 3008 wrote to memory of 2696 3008 rundll32.exe 29 PID 3008 wrote to memory of 2696 3008 rundll32.exe 29 PID 3008 wrote to memory of 2696 3008 rundll32.exe 29 PID 2696 wrote to memory of 2704 2696 rundll32.exe 30 PID 2696 wrote to memory of 2704 2696 rundll32.exe 30 PID 2696 wrote to memory of 2704 2696 rundll32.exe 30 PID 2696 wrote to memory of 2704 2696 rundll32.exe 30 PID 2696 wrote to memory of 2704 2696 rundll32.exe 30 PID 2696 wrote to memory of 2704 2696 rundll32.exe 30 PID 2696 wrote to memory of 2704 2696 rundll32.exe 30 PID 2696 wrote to memory of 2704 2696 rundll32.exe 30 PID 2696 wrote to memory of 2704 2696 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2ffa748dbec79695cb311d6c3fadf3182972db352d6c4d2ec1e036f726b3bdd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2ffa748dbec79695cb311d6c3fadf3182972db352d6c4d2ec1e036f726b3bdd.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:2704
-
-