Analysis
-
max time kernel
140s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 12:14
Behavioral task
behavioral1
Sample
b9d81c5e68d72623194b6c6dfb4b3a44acca4bb9b41d4f9101c0c5f12d06bf63.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b9d81c5e68d72623194b6c6dfb4b3a44acca4bb9b41d4f9101c0c5f12d06bf63.dll
-
Size
899KB
-
MD5
22f341bde5507e0c7d7d9b30a796fbb0
-
SHA1
b9ee2873e7f46b4539d687b93808de56bc41bd33
-
SHA256
b9d81c5e68d72623194b6c6dfb4b3a44acca4bb9b41d4f9101c0c5f12d06bf63
-
SHA512
0f8173aabb9b371e66f3ae751f6568fb3af01525575024897e6ff253f9e07fb922da8729fbe61daa1ec03d526d24d4b283ab9e9a4aed5f280c520a7a747d0f14
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX2:7wqd87V2
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4292-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
rundll32.exepid process 4292 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3760 wrote to memory of 4292 3760 rundll32.exe rundll32.exe PID 3760 wrote to memory of 4292 3760 rundll32.exe rundll32.exe PID 3760 wrote to memory of 4292 3760 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9d81c5e68d72623194b6c6dfb4b3a44acca4bb9b41d4f9101c0c5f12d06bf63.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b9d81c5e68d72623194b6c6dfb4b3a44acca4bb9b41d4f9101c0c5f12d06bf63.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4372,i,6576818814118437872,11004518367271063231,262144 --variations-seed-version --mojo-platform-channel-handle=1032 /prefetch:81⤵PID:2948