Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 18:03
Behavioral task
behavioral1
Sample
5b93c710ee4c26e7ef6ca6cfe4dd4553cc36e175b162cff53045584bb5043d2c.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
5b93c710ee4c26e7ef6ca6cfe4dd4553cc36e175b162cff53045584bb5043d2c.dll
-
Size
899KB
-
MD5
798a996226862a7a470f824de8328238
-
SHA1
88a107d4ff9f7f55c21c3f954e7230e0af94bf88
-
SHA256
5b93c710ee4c26e7ef6ca6cfe4dd4553cc36e175b162cff53045584bb5043d2c
-
SHA512
51fbd388ced2bb7283f4724d24a098c9f30fc3c352d38c9261ee22c7048b8954a8ee7c7274a4c9f0121323c3a5bdc85b1eba0ca3432bf9388aa0dbe54cda72e0
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXt:7wqd87Vt
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/5076-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5076 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4288 wrote to memory of 5076 4288 rundll32.exe 82 PID 4288 wrote to memory of 5076 4288 rundll32.exe 82 PID 4288 wrote to memory of 5076 4288 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b93c710ee4c26e7ef6ca6cfe4dd4553cc36e175b162cff53045584bb5043d2c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5b93c710ee4c26e7ef6ca6cfe4dd4553cc36e175b162cff53045584bb5043d2c.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:5076
-