Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 12:13
Behavioral task
behavioral1
Sample
46f5a9fbbf8e75f20f99d3b92dc1d620fcc0259953d086da7fce2b566f072934.dll
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
46f5a9fbbf8e75f20f99d3b92dc1d620fcc0259953d086da7fce2b566f072934.dll
-
Size
51KB
-
MD5
7f4ee4be4c1fcfa930baf9ede5cd68b4
-
SHA1
a134f8ca152fef7b581d94085b8f0777df24478e
-
SHA256
46f5a9fbbf8e75f20f99d3b92dc1d620fcc0259953d086da7fce2b566f072934
-
SHA512
81335b6cdf2d660c4604bc6a419f41387cb16a79626dccb04cd2190babe7b5e2658d2ad5c9490ada477124fe6786cd46a2f6cff2c1988c04ef429be8a6d8c728
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLOJYH5:1dWubF3n9S91BF3fboCJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3992-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 3992 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2368 wrote to memory of 3992 2368 rundll32.exe rundll32.exe PID 2368 wrote to memory of 3992 2368 rundll32.exe rundll32.exe PID 2368 wrote to memory of 3992 2368 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46f5a9fbbf8e75f20f99d3b92dc1d620fcc0259953d086da7fce2b566f072934.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46f5a9fbbf8e75f20f99d3b92dc1d620fcc0259953d086da7fce2b566f072934.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3992