Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 17:18
Behavioral task
behavioral1
Sample
4dc7c9a0e058321ddfce58d8ac74141bbab7945b8f4f549c611b3a711ce91256.dll
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
4dc7c9a0e058321ddfce58d8ac74141bbab7945b8f4f549c611b3a711ce91256.dll
-
Size
899KB
-
MD5
20ce3cf21833616720c961c1dbe49f39
-
SHA1
db89500c9cad2faf57426501dbf4471c00af626e
-
SHA256
4dc7c9a0e058321ddfce58d8ac74141bbab7945b8f4f549c611b3a711ce91256
-
SHA512
dda2abda074427f2930495c479617c6f434bbe9a0331c37c6f239ce5280266ad2d37d1b351e76f229b5d6d19242c60bc12d6415bf54df98782f5e4121aae3286
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXt:7wqd87Vt
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2920-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2920 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2920 2904 rundll32.exe 28 PID 2904 wrote to memory of 2920 2904 rundll32.exe 28 PID 2904 wrote to memory of 2920 2904 rundll32.exe 28 PID 2904 wrote to memory of 2920 2904 rundll32.exe 28 PID 2904 wrote to memory of 2920 2904 rundll32.exe 28 PID 2904 wrote to memory of 2920 2904 rundll32.exe 28 PID 2904 wrote to memory of 2920 2904 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc7c9a0e058321ddfce58d8ac74141bbab7945b8f4f549c611b3a711ce91256.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc7c9a0e058321ddfce58d8ac74141bbab7945b8f4f549c611b3a711ce91256.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2920
-