Analysis
-
max time kernel
141s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 06:35
Behavioral task
behavioral1
Sample
a85c31881905176112b52364b98db45ace1fc024b1b6c091ea591b36852576f5.dll
Resource
win7-20240220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
a85c31881905176112b52364b98db45ace1fc024b1b6c091ea591b36852576f5.dll
-
Size
51KB
-
MD5
d9fa9e3317f1ef0c6a62a0dc101a0801
-
SHA1
07606d8fc92cb2c2eb9d9a3f354cf04f3c426d82
-
SHA256
a85c31881905176112b52364b98db45ace1fc024b1b6c091ea591b36852576f5
-
SHA512
02f3aacc35794f8bb0cd043163dd635c476d64cfe69625a41dcf05e96194ba36c4ad91c3a517b313a644a300dff029ca5f8ac081ecf619a504ce2c66c1f7667e
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLQJYH5:1dWubF3n9S91BF3fboUJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4604-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 4604 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4716 wrote to memory of 4604 4716 rundll32.exe rundll32.exe PID 4716 wrote to memory of 4604 4716 rundll32.exe rundll32.exe PID 4716 wrote to memory of 4604 4716 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a85c31881905176112b52364b98db45ace1fc024b1b6c091ea591b36852576f5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a85c31881905176112b52364b98db45ace1fc024b1b6c091ea591b36852576f5.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4604