Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 10:17
Behavioral task
behavioral1
Sample
593b217fe4930ebadebda644259c5923f00946fecac31d7bc55475d61523984c.dll
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
593b217fe4930ebadebda644259c5923f00946fecac31d7bc55475d61523984c.dll
-
Size
51KB
-
MD5
68a0d7abac34271f942ce42cc8c2afa3
-
SHA1
6e3557a178a10132fc89b9b4d48d7e6da0e2ceaa
-
SHA256
593b217fe4930ebadebda644259c5923f00946fecac31d7bc55475d61523984c
-
SHA512
3a8210c2b0d912d7c9feb7f3f09d8d8e3b3990e3d041f50b616767ba42b4eeca983964f1a27bbf485b36cb92d45123f44a1c7c28bcbd2a70f1cd329f5da3642b
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL+WJYH5:1dWubF3n9S91BF3fbohJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1852-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 1852 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe PID 1904 wrote to memory of 1852 1904 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\593b217fe4930ebadebda644259c5923f00946fecac31d7bc55475d61523984c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\593b217fe4930ebadebda644259c5923f00946fecac31d7bc55475d61523984c.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1852