Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 02:40
Behavioral task
behavioral1
Sample
220a7e6f68d90e0f3a848e9b6efd61334587c519271ff67a279c6795bcdba61f.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
220a7e6f68d90e0f3a848e9b6efd61334587c519271ff67a279c6795bcdba61f.dll
-
Size
49KB
-
MD5
8079d4c9468dc504276f319e207c8dfd
-
SHA1
daf585bfc4879193fd71a1508cbfaa5d773e2a2a
-
SHA256
220a7e6f68d90e0f3a848e9b6efd61334587c519271ff67a279c6795bcdba61f
-
SHA512
88480ab93d7509f92280adc7a42113cc4128f43b7e80ab670a2dcee81569034fce114657aee6a31682fb83b3c1b4daefcdd0f8495c660d384c17db0b133d4bb7
-
SSDEEP
1536:CDwMsml26T5zBj+alf1H9jfbyqkY4ZvoDUhgJOSJYHB9ElHS:Cn7zBjPp1H9ovoDUgJNJYHBWZS
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2792-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2792 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 220 wrote to memory of 2792 220 rundll32.exe rundll32.exe PID 220 wrote to memory of 2792 220 rundll32.exe rundll32.exe PID 220 wrote to memory of 2792 220 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\220a7e6f68d90e0f3a848e9b6efd61334587c519271ff67a279c6795bcdba61f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\220a7e6f68d90e0f3a848e9b6efd61334587c519271ff67a279c6795bcdba61f.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2792