Analysis
-
max time kernel
150s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 08:22
Behavioral task
behavioral1
Sample
b6effedbbd376c31791ff536f2c5b28bc8985a970b5ad00229ebec1aac5b0837.dll
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b6effedbbd376c31791ff536f2c5b28bc8985a970b5ad00229ebec1aac5b0837.dll
-
Size
899KB
-
MD5
ed6e111d8a94f67c08353f2e584ccae4
-
SHA1
c4aaffd4fde2306d2527e274b4cc6523ee7d59f0
-
SHA256
b6effedbbd376c31791ff536f2c5b28bc8985a970b5ad00229ebec1aac5b0837
-
SHA512
70ae057f0754efb9346a9a0b6b7136d8eacdc40641a986653944a44d9e65009a3dbb724564d11ecc47860c57f0fbec0eacdabb1013e2888517053eed2a8dfa84
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXS:7wqd87VS
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2860-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 2860 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 5348 wrote to memory of 2860 5348 rundll32.exe rundll32.exe PID 5348 wrote to memory of 2860 5348 rundll32.exe rundll32.exe PID 5348 wrote to memory of 2860 5348 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6effedbbd376c31791ff536f2c5b28bc8985a970b5ad00229ebec1aac5b0837.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6effedbbd376c31791ff536f2c5b28bc8985a970b5ad00229ebec1aac5b0837.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2860