Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 04:41
Behavioral task
behavioral1
Sample
54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll
-
Size
136KB
-
MD5
d3e8a42516bdceda359a593ade592b8a
-
SHA1
7dcb9d88b4697d4e8d9d8259f531af75fa738b42
-
SHA256
54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955
-
SHA512
331075bc3fa99e522acb49bbe4534b18ae4bd285876a6caabae0e6c109db7e180df42577faa58cdbc9ebe3f2e434bfae6f9a6bfc073bfc18f68296bdd2727040
-
SSDEEP
3072:dhPm77B1ZDwB76mVlZ9FArVf0SA3MG5vY:vWd1ZDg7HXArVf65vY
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2184-2-0x0000000000400000-0x000000000040A000-memory.dmp family_gh0strat behavioral1/memory/2184-6-0x0000000000400000-0x000000000040A000-memory.dmp family_gh0strat behavioral1/memory/2184-3-0x0000000000400000-0x000000000040A000-memory.dmp family_gh0strat behavioral1/memory/2184-8-0x0000000000400000-0x000000000040A000-memory.dmp family_gh0strat behavioral1/memory/2184-9-0x0000000000400000-0x000000000040A000-memory.dmp family_gh0strat behavioral1/memory/2184-10-0x0000000000400000-0x000000000040A000-memory.dmp family_gh0strat -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 211.57.200.17 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 2372 set thread context of 2184 2372 rundll32.exe svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1652 wrote to memory of 2372 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 2372 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 2372 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 2372 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 2372 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 2372 1652 rundll32.exe rundll32.exe PID 1652 wrote to memory of 2372 1652 rundll32.exe rundll32.exe PID 2372 wrote to memory of 2184 2372 rundll32.exe svchost.exe PID 2372 wrote to memory of 2184 2372 rundll32.exe svchost.exe PID 2372 wrote to memory of 2184 2372 rundll32.exe svchost.exe PID 2372 wrote to memory of 2184 2372 rundll32.exe svchost.exe PID 2372 wrote to memory of 2184 2372 rundll32.exe svchost.exe PID 2372 wrote to memory of 2184 2372 rundll32.exe svchost.exe PID 2372 wrote to memory of 2184 2372 rundll32.exe svchost.exe PID 2372 wrote to memory of 2184 2372 rundll32.exe svchost.exe PID 2372 wrote to memory of 2184 2372 rundll32.exe svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2184-2-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2184-4-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2184-0-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2184-1-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2184-6-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2184-3-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2184-8-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2184-9-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2184-10-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB