Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 18:03
Behavioral task
behavioral1
Sample
5b93c710ee4c26e7ef6ca6cfe4dd4553cc36e175b162cff53045584bb5043d2c.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
5b93c710ee4c26e7ef6ca6cfe4dd4553cc36e175b162cff53045584bb5043d2c.dll
-
Size
899KB
-
MD5
798a996226862a7a470f824de8328238
-
SHA1
88a107d4ff9f7f55c21c3f954e7230e0af94bf88
-
SHA256
5b93c710ee4c26e7ef6ca6cfe4dd4553cc36e175b162cff53045584bb5043d2c
-
SHA512
51fbd388ced2bb7283f4724d24a098c9f30fc3c352d38c9261ee22c7048b8954a8ee7c7274a4c9f0121323c3a5bdc85b1eba0ca3432bf9388aa0dbe54cda72e0
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXt:7wqd87Vt
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2076-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2076 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2756 wrote to memory of 2076 2756 rundll32.exe rundll32.exe PID 2756 wrote to memory of 2076 2756 rundll32.exe rundll32.exe PID 2756 wrote to memory of 2076 2756 rundll32.exe rundll32.exe PID 2756 wrote to memory of 2076 2756 rundll32.exe rundll32.exe PID 2756 wrote to memory of 2076 2756 rundll32.exe rundll32.exe PID 2756 wrote to memory of 2076 2756 rundll32.exe rundll32.exe PID 2756 wrote to memory of 2076 2756 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b93c710ee4c26e7ef6ca6cfe4dd4553cc36e175b162cff53045584bb5043d2c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b93c710ee4c26e7ef6ca6cfe4dd4553cc36e175b162cff53045584bb5043d2c.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2076