Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 18:20
Behavioral task
behavioral1
Sample
06499990655bb18aff6d866e9bf8ce8fb31408fa50aa3f7d3b9009fd59d5417a.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
06499990655bb18aff6d866e9bf8ce8fb31408fa50aa3f7d3b9009fd59d5417a.dll
-
Size
899KB
-
MD5
cfc67cf7d08c6e80b16267c787b47357
-
SHA1
c9ea5285873c2cf5ad79fe95edd81c4d1f9c7b5c
-
SHA256
06499990655bb18aff6d866e9bf8ce8fb31408fa50aa3f7d3b9009fd59d5417a
-
SHA512
c0995c77a52523dc4b7a4fbbaaed0267c9f5d4ce6b46213a1beeb15755287d28dd524c4a5d92ce1577deec8fe098d35625d16aa3d2819669bf23fd2ccac5c512
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXa:7wqd87Va
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3852-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3852 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1920 wrote to memory of 3852 1920 rundll32.exe 83 PID 1920 wrote to memory of 3852 1920 rundll32.exe 83 PID 1920 wrote to memory of 3852 1920 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06499990655bb18aff6d866e9bf8ce8fb31408fa50aa3f7d3b9009fd59d5417a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06499990655bb18aff6d866e9bf8ce8fb31408fa50aa3f7d3b9009fd59d5417a.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3852
-