Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 15:21
Behavioral task
behavioral1
Sample
9ce73e05aa931f30f9dc58b8c019ca47a974e76e064a62b6edeee98bda7ca568.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
9ce73e05aa931f30f9dc58b8c019ca47a974e76e064a62b6edeee98bda7ca568.dll
-
Size
899KB
-
MD5
d7233188167084e8b0247fde1a1d3445
-
SHA1
5df12028853133911db975d5babc5c4d60982dc5
-
SHA256
9ce73e05aa931f30f9dc58b8c019ca47a974e76e064a62b6edeee98bda7ca568
-
SHA512
950cef9c66c11f34a876da411b4dbb41836df65fdc1cb184ae3e850b74dada5af0ff5f2978bc76d5d48ca1312d55f159c32f6afc48653c2435421c939b2fa797
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXK:7wqd87VK
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4740-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4740 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4076 wrote to memory of 4740 4076 rundll32.exe 91 PID 4076 wrote to memory of 4740 4076 rundll32.exe 91 PID 4076 wrote to memory of 4740 4076 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ce73e05aa931f30f9dc58b8c019ca47a974e76e064a62b6edeee98bda7ca568.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9ce73e05aa931f30f9dc58b8c019ca47a974e76e064a62b6edeee98bda7ca568.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:628