Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 04:41

General

  • Target

    54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll

  • Size

    136KB

  • MD5

    d3e8a42516bdceda359a593ade592b8a

  • SHA1

    7dcb9d88b4697d4e8d9d8259f531af75fa738b42

  • SHA256

    54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955

  • SHA512

    331075bc3fa99e522acb49bbe4534b18ae4bd285876a6caabae0e6c109db7e180df42577faa58cdbc9ebe3f2e434bfae6f9a6bfc073bfc18f68296bdd2727040

  • SSDEEP

    3072:dhPm77B1ZDwB76mVlZ9FArVf0SA3MG5vY:vWd1ZDg7HXArVf65vY

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll,#1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
          PID:760
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          3⤵
            PID:3824
          • C:\Windows\SysWOW64\svchost.exe
            "C:\Windows\system32\svchost.exe"
            3⤵
              PID:4340
            • C:\Windows\SysWOW64\svchost.exe
              "C:\Windows\system32\svchost.exe"
              3⤵
                PID:2960
              • C:\Windows\SysWOW64\svchost.exe
                "C:\Windows\system32\svchost.exe"
                3⤵
                  PID:4848

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/760-0-0x0000000000400000-0x000000000040A000-memory.dmp
              Filesize

              40KB

            • memory/760-3-0x0000000000400000-0x000000000040A000-memory.dmp
              Filesize

              40KB

            • memory/760-2-0x0000000000400000-0x000000000040A000-memory.dmp
              Filesize

              40KB

            • memory/760-4-0x0000000000400000-0x000000000040A000-memory.dmp
              Filesize

              40KB

            • memory/760-8-0x0000000000400000-0x000000000040A000-memory.dmp
              Filesize

              40KB