Analysis
-
max time kernel
140s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 23:14
Behavioral task
behavioral1
Sample
f23e6fead2c6e471fde9ebacc29af0918d235b0b5d063883656ccb22c5624e2e.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
f23e6fead2c6e471fde9ebacc29af0918d235b0b5d063883656ccb22c5624e2e.dll
-
Size
899KB
-
MD5
cab656587fc25921c70963f6e07f5aaf
-
SHA1
2c6692ff17f2b16c7e903c9d4405ffc8e43591d2
-
SHA256
f23e6fead2c6e471fde9ebacc29af0918d235b0b5d063883656ccb22c5624e2e
-
SHA512
553b331656c12838c9498c6ec1c7e0aad4393a1c8324ffa06b608eab65dccf5b1fe0f80998480f35fa1f949455345e6a1d66acdaac0a8a60feac851d67c5981c
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXO:7wqd87VO
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3836-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3836 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4520 wrote to memory of 3836 4520 rundll32.exe 82 PID 4520 wrote to memory of 3836 4520 rundll32.exe 82 PID 4520 wrote to memory of 3836 4520 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f23e6fead2c6e471fde9ebacc29af0918d235b0b5d063883656ccb22c5624e2e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f23e6fead2c6e471fde9ebacc29af0918d235b0b5d063883656ccb22c5624e2e.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3836
-