Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 04:41
Behavioral task
behavioral1
Sample
54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll
-
Size
136KB
-
MD5
d3e8a42516bdceda359a593ade592b8a
-
SHA1
7dcb9d88b4697d4e8d9d8259f531af75fa738b42
-
SHA256
54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955
-
SHA512
331075bc3fa99e522acb49bbe4534b18ae4bd285876a6caabae0e6c109db7e180df42577faa58cdbc9ebe3f2e434bfae6f9a6bfc073bfc18f68296bdd2727040
-
SSDEEP
3072:dhPm77B1ZDwB76mVlZ9FArVf0SA3MG5vY:vWd1ZDg7HXArVf65vY
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/760-0-0x0000000000400000-0x000000000040A000-memory.dmp family_gh0strat behavioral2/memory/760-3-0x0000000000400000-0x000000000040A000-memory.dmp family_gh0strat behavioral2/memory/760-2-0x0000000000400000-0x000000000040A000-memory.dmp family_gh0strat behavioral2/memory/760-4-0x0000000000400000-0x000000000040A000-memory.dmp family_gh0strat behavioral2/memory/760-8-0x0000000000400000-0x000000000040A000-memory.dmp family_gh0strat -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 211.57.200.17 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
rundll32.exedescription pid process target process PID 1976 set thread context of 760 1976 rundll32.exe svchost.exe PID 1976 set thread context of 4848 1976 rundll32.exe svchost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1588 wrote to memory of 1976 1588 rundll32.exe rundll32.exe PID 1588 wrote to memory of 1976 1588 rundll32.exe rundll32.exe PID 1588 wrote to memory of 1976 1588 rundll32.exe rundll32.exe PID 1976 wrote to memory of 760 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 760 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 760 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 760 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 760 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 760 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 760 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 760 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 3824 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 3824 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 3824 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 4340 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 4340 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 4340 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 2960 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 2960 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 2960 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 4848 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 4848 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 4848 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 4848 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 4848 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 4848 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 4848 1976 rundll32.exe svchost.exe PID 1976 wrote to memory of 4848 1976 rundll32.exe svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54969a0bda4659787e0f8b425e6ef69f60b2439023150c7428f34dc561590955.dll,#12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:760
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:3824
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:4340
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:2960
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:4848