Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 19:20
Behavioral task
behavioral1
Sample
00e74b3554712b92fa0e07d7f2c36ce935c9cd1784530b4b669c9e2e3bddd389.dll
Resource
win7-20240215-en
4 signatures
150 seconds
General
-
Target
00e74b3554712b92fa0e07d7f2c36ce935c9cd1784530b4b669c9e2e3bddd389.dll
-
Size
899KB
-
MD5
5770a8ea8945c29a58fa1b9a63e49aac
-
SHA1
836554c47db4ab923c4106c466e5ae15e8f95d13
-
SHA256
00e74b3554712b92fa0e07d7f2c36ce935c9cd1784530b4b669c9e2e3bddd389
-
SHA512
eda80a53fa2bd86d95dbdf4035e149bb3f3fc9b4b3ffdacad1ba90d19f825fbfd9cc343d4ddf43d10b36ec3fc14a6f7fc4ae6fa0b49f16405995f35386fb572c
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXp:7wqd87Vp
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4580-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4580 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 712 wrote to memory of 4580 712 rundll32.exe 82 PID 712 wrote to memory of 4580 712 rundll32.exe 82 PID 712 wrote to memory of 4580 712 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00e74b3554712b92fa0e07d7f2c36ce935c9cd1784530b4b669c9e2e3bddd389.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00e74b3554712b92fa0e07d7f2c36ce935c9cd1784530b4b669c9e2e3bddd389.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4580
-