Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 07:16
Behavioral task
behavioral1
Sample
da5a4a3f9f8cfbb976cee66a460e7f0bb40d4a2d0ddca91d5e04958c40aa4b41.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
da5a4a3f9f8cfbb976cee66a460e7f0bb40d4a2d0ddca91d5e04958c40aa4b41.dll
-
Size
899KB
-
MD5
ef24c476ea615eb4b3793849e8a09809
-
SHA1
a062d684307e3cf6eee11b26d87fad6ef8d6584d
-
SHA256
da5a4a3f9f8cfbb976cee66a460e7f0bb40d4a2d0ddca91d5e04958c40aa4b41
-
SHA512
cc07b23ed14a99c643fa87ab6fa1e5d7b9599b8e3f81f01bdc005ba9866bedc6ecd95c597eb68e6f45fee5f45c9e021d390319d014634c9b70ad168c0ad37fa2
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXU:7wqd87VU
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1584-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1584 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1584 2080 rundll32.exe 28 PID 2080 wrote to memory of 1584 2080 rundll32.exe 28 PID 2080 wrote to memory of 1584 2080 rundll32.exe 28 PID 2080 wrote to memory of 1584 2080 rundll32.exe 28 PID 2080 wrote to memory of 1584 2080 rundll32.exe 28 PID 2080 wrote to memory of 1584 2080 rundll32.exe 28 PID 2080 wrote to memory of 1584 2080 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da5a4a3f9f8cfbb976cee66a460e7f0bb40d4a2d0ddca91d5e04958c40aa4b41.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da5a4a3f9f8cfbb976cee66a460e7f0bb40d4a2d0ddca91d5e04958c40aa4b41.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1584
-