Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 02:44
Behavioral task
behavioral1
Sample
a5282bde58feff039982218cb6ebbc29434c3184fc9634c0cff5ccd2c4c2e200.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
a5282bde58feff039982218cb6ebbc29434c3184fc9634c0cff5ccd2c4c2e200.dll
-
Size
899KB
-
MD5
6dfebc570da147a893226028dd32cc56
-
SHA1
1586415a4178782f40bb80df28868762f1e6be0c
-
SHA256
a5282bde58feff039982218cb6ebbc29434c3184fc9634c0cff5ccd2c4c2e200
-
SHA512
39ead4d4d53eafff0599ab039e48055da279841eb1805f9558648cc93ca16763f3fb022007784e07bef6f4cad44cca37853d923fd315d6a75d8b11ce6f423c1d
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXI:7wqd87VI
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/5028-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5028 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 5028 4748 rundll32.exe 84 PID 4748 wrote to memory of 5028 4748 rundll32.exe 84 PID 4748 wrote to memory of 5028 4748 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5282bde58feff039982218cb6ebbc29434c3184fc9634c0cff5ccd2c4c2e200.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5282bde58feff039982218cb6ebbc29434c3184fc9634c0cff5ccd2c4c2e200.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:5028
-