Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 19:20
Behavioral task
behavioral1
Sample
00e74b3554712b92fa0e07d7f2c36ce935c9cd1784530b4b669c9e2e3bddd389.dll
Resource
win7-20240215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
00e74b3554712b92fa0e07d7f2c36ce935c9cd1784530b4b669c9e2e3bddd389.dll
-
Size
899KB
-
MD5
5770a8ea8945c29a58fa1b9a63e49aac
-
SHA1
836554c47db4ab923c4106c466e5ae15e8f95d13
-
SHA256
00e74b3554712b92fa0e07d7f2c36ce935c9cd1784530b4b669c9e2e3bddd389
-
SHA512
eda80a53fa2bd86d95dbdf4035e149bb3f3fc9b4b3ffdacad1ba90d19f825fbfd9cc343d4ddf43d10b36ec3fc14a6f7fc4ae6fa0b49f16405995f35386fb572c
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXp:7wqd87Vp
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2480-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2480 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2480 2356 rundll32.exe 28 PID 2356 wrote to memory of 2480 2356 rundll32.exe 28 PID 2356 wrote to memory of 2480 2356 rundll32.exe 28 PID 2356 wrote to memory of 2480 2356 rundll32.exe 28 PID 2356 wrote to memory of 2480 2356 rundll32.exe 28 PID 2356 wrote to memory of 2480 2356 rundll32.exe 28 PID 2356 wrote to memory of 2480 2356 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00e74b3554712b92fa0e07d7f2c36ce935c9cd1784530b4b669c9e2e3bddd389.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00e74b3554712b92fa0e07d7f2c36ce935c9cd1784530b4b669c9e2e3bddd389.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2480
-