Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 10:57
Behavioral task
behavioral1
Sample
4cd51b9b404d58c15eb3dc1e38f289f0_NEAS.dll
Resource
win7-20240215-en
4 signatures
150 seconds
General
-
Target
4cd51b9b404d58c15eb3dc1e38f289f0_NEAS.dll
-
Size
899KB
-
MD5
4cd51b9b404d58c15eb3dc1e38f289f0
-
SHA1
0385c88cf376d54fe3a033464f515019f42314f8
-
SHA256
55cbc9e7e217c1ed00f552ef73dd572d15dd586bac2bfacd305e45c83f561a61
-
SHA512
e1bf089e6c3b7d1df79d6ba7eb973c1a0d1c7591a3b4bdea9bd57e29d4e524e28d481c43c26845bb07f1aed0893cef0660a38a6ed3a046d4c2e6141d3d7878cf
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX/:7wqd87V/
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2072-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2072 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2072 1416 rundll32.exe 85 PID 1416 wrote to memory of 2072 1416 rundll32.exe 85 PID 1416 wrote to memory of 2072 1416 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4cd51b9b404d58c15eb3dc1e38f289f0_NEAS.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4cd51b9b404d58c15eb3dc1e38f289f0_NEAS.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2072
-