Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 18:15
Behavioral task
behavioral1
Sample
f11e76f98839a63cdb500ce41be4e91266f158924150f4a315f45c13bf5ae8c2.dll
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f11e76f98839a63cdb500ce41be4e91266f158924150f4a315f45c13bf5ae8c2.dll
-
Size
899KB
-
MD5
53024afa7f4389d98307eb86544222e9
-
SHA1
496f209982c3fcdb04840e733d327e09953382ac
-
SHA256
f11e76f98839a63cdb500ce41be4e91266f158924150f4a315f45c13bf5ae8c2
-
SHA512
c6afe3d5c47f80ecc2afc0f828af98ea93348fe983a5436ffbbc20dfad96acff0fc4fffd0b0a6fb6370bfc82c0f1eae60f0efcbc9e5b514069c6c617984b353d
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXb:7wqd87Vb
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4064-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4064 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 4064 2224 rundll32.exe 87 PID 2224 wrote to memory of 4064 2224 rundll32.exe 87 PID 2224 wrote to memory of 4064 2224 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f11e76f98839a63cdb500ce41be4e91266f158924150f4a315f45c13bf5ae8c2.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f11e76f98839a63cdb500ce41be4e91266f158924150f4a315f45c13bf5ae8c2.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3888,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=4168 /prefetch:81⤵PID:4836