Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 04:41

General

  • Target

    54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll

  • Size

    136KB

  • MD5

    d3e8a42516bdceda359a593ade592b8a

  • SHA1

    7dcb9d88b4697d4e8d9d8259f531af75fa738b42

  • SHA256

    54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955

  • SHA512

    331075bc3fa99e522acb49bbe4534b18ae4bd285876a6caabae0e6c109db7e180df42577faa58cdbc9ebe3f2e434bfae6f9a6bfc073bfc18f68296bdd2727040

  • SSDEEP

    3072:dhPm77B1ZDwB76mVlZ9FArVf0SA3MG5vY:vWd1ZDg7HXArVf65vY

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
          PID:2184

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2184-2-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2184-4-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2184-0-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2184-1-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2184-6-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2184-3-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2184-8-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2184-9-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/2184-10-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB