Analysis
-
max time kernel
142s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 00:49
Behavioral task
behavioral1
Sample
d2009d17e01b002e68e645eafe3053975e2e396c77d8928c1ead154659b447b5.dll
Resource
win7-20240220-en
4 signatures
150 seconds
General
-
Target
d2009d17e01b002e68e645eafe3053975e2e396c77d8928c1ead154659b447b5.dll
-
Size
899KB
-
MD5
8ac38a0c26dec320e338e552d0d240a7
-
SHA1
d6e2beadfa0c292294f73bd0e5a19b452161b77a
-
SHA256
d2009d17e01b002e68e645eafe3053975e2e396c77d8928c1ead154659b447b5
-
SHA512
a6a0df5591ea7a35c452e0710b12d8b4a9b569baf3ae3f5e0e9d7b123adbdb407d214e64ead3cb827edf8f9402fef83d574b4f007b881bc735ad748a1dbfdbd5
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXj:7wqd87Vj
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1660-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1660 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1660 1344 rundll32.exe 82 PID 1344 wrote to memory of 1660 1344 rundll32.exe 82 PID 1344 wrote to memory of 1660 1344 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2009d17e01b002e68e645eafe3053975e2e396c77d8928c1ead154659b447b5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d2009d17e01b002e68e645eafe3053975e2e396c77d8928c1ead154659b447b5.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1660
-