Resubmissions
04-05-2024 23:26
240504-3e33dafb5w 10Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 23:26
Behavioral task
behavioral1
Sample
67b026affb29929103b358737c9ef84f9a274e8de04947f9de61a3b31e1bbb56.dll
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
67b026affb29929103b358737c9ef84f9a274e8de04947f9de61a3b31e1bbb56.dll
-
Size
899KB
-
MD5
bdee1e4440bbf427c4321a213cae260e
-
SHA1
940734c33d7641c0787a7d2013619c9665c14038
-
SHA256
67b026affb29929103b358737c9ef84f9a274e8de04947f9de61a3b31e1bbb56
-
SHA512
0a04865e499b5e651217e8a584203d979a5749bc19cc5a2fc075d255b52e6c684367eacd0799b22967e9e338d29685a78545c1f93d269c417f741c7fc25a6ed9
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXX:7wqd87VX
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1248-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1248 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4932 wrote to memory of 1248 4932 rundll32.exe 83 PID 4932 wrote to memory of 1248 4932 rundll32.exe 83 PID 4932 wrote to memory of 1248 4932 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67b026affb29929103b358737c9ef84f9a274e8de04947f9de61a3b31e1bbb56.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67b026affb29929103b358737c9ef84f9a274e8de04947f9de61a3b31e1bbb56.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1248
-