Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 20:23
Behavioral task
behavioral1
Sample
7d5f3b202d816e34c784105270e284abd2cc74a12d9c181646ec01b4b5b893b2.dll
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
7d5f3b202d816e34c784105270e284abd2cc74a12d9c181646ec01b4b5b893b2.dll
-
Size
50KB
-
MD5
d10a323b8efd5a14ae65b8492aaaa4d9
-
SHA1
f6cb6d1a09f09a285067dad9e04442771103ae20
-
SHA256
7d5f3b202d816e34c784105270e284abd2cc74a12d9c181646ec01b4b5b893b2
-
SHA512
a9063e1c47a44cae4b15381c720b273a01b721a4f2d84fcbd18ec9b8da02a7796a56480f9c4d351db3e843245d1d7eeeeaa225426b07ea709e6544299d011eef
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5JJYH:W5ReWjTrW9rNPgYo3JYH
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1620-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1620 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3256 wrote to memory of 1620 3256 rundll32.exe 83 PID 3256 wrote to memory of 1620 3256 rundll32.exe 83 PID 3256 wrote to memory of 1620 3256 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d5f3b202d816e34c784105270e284abd2cc74a12d9c181646ec01b4b5b893b2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d5f3b202d816e34c784105270e284abd2cc74a12d9c181646ec01b4b5b893b2.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1620
-