Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 04:11
Behavioral task
behavioral1
Sample
3ee8e3097bb7f7704c9749743d43bafd2c0afaf243384fef6d088e728448b1ec.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
3ee8e3097bb7f7704c9749743d43bafd2c0afaf243384fef6d088e728448b1ec.dll
-
Size
51KB
-
MD5
050dd8b439b7c20714e1baa569b3f727
-
SHA1
d9a9d87d7602797d427d3b1b289352bfd908d48b
-
SHA256
3ee8e3097bb7f7704c9749743d43bafd2c0afaf243384fef6d088e728448b1ec
-
SHA512
3263ead4bfa6f3376aa887ea9fe78cbbaaaec485fac66c20878b0c1b771bd89b5aef9c11939c2e9376d67d2d0cdc7a24ec6b1f0215b59c915ec660f7aad5ad5f
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3fr9oL8JYH5:1dWubF3n9S91BF3fhoAJYH5
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3912-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 3912 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1072 wrote to memory of 3912 1072 rundll32.exe rundll32.exe PID 1072 wrote to memory of 3912 1072 rundll32.exe rundll32.exe PID 1072 wrote to memory of 3912 1072 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ee8e3097bb7f7704c9749743d43bafd2c0afaf243384fef6d088e728448b1ec.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ee8e3097bb7f7704c9749743d43bafd2c0afaf243384fef6d088e728448b1ec.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1280,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:81⤵PID:4024