Analysis
-
max time kernel
148s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 01:35
Behavioral task
behavioral1
Sample
9e5928cb2c055b64bf7a1bc55c3f3b15c0c4f1fbbfec7529819a5cff08ecd448.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
9e5928cb2c055b64bf7a1bc55c3f3b15c0c4f1fbbfec7529819a5cff08ecd448.dll
-
Size
51KB
-
MD5
53845ed73fdabee1da9edad8831762b0
-
SHA1
b5676106a0deef66842f2153140cd2ec56706f55
-
SHA256
9e5928cb2c055b64bf7a1bc55c3f3b15c0c4f1fbbfec7529819a5cff08ecd448
-
SHA512
9c70c0d6ec848ecb5b725ebc850e407d1a5dfd1e395944ba168c46016aebd5d0eb3af0e220ef4a1a65860920370cdc111007dd5634b6432d1d39aafe020415e6
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLvJYH5:1dWubF3n9S91BF3fbojJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/924-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 924 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2124 wrote to memory of 924 2124 rundll32.exe 82 PID 2124 wrote to memory of 924 2124 rundll32.exe 82 PID 2124 wrote to memory of 924 2124 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e5928cb2c055b64bf7a1bc55c3f3b15c0c4f1fbbfec7529819a5cff08ecd448.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e5928cb2c055b64bf7a1bc55c3f3b15c0c4f1fbbfec7529819a5cff08ecd448.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:924
-