Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 21:01
Behavioral task
behavioral1
Sample
581174aeb94c12f9e9fcf29d6c2b875323ff5285d12c6531bdccf9e81033b2ec.dll
Resource
win7-20240508-en
4 signatures
150 seconds
General
-
Target
581174aeb94c12f9e9fcf29d6c2b875323ff5285d12c6531bdccf9e81033b2ec.dll
-
Size
899KB
-
MD5
b7f8a71bad53fa4ae7ec333150946e25
-
SHA1
ea1244fdd18d449861be6fac96124aaaa6c224f2
-
SHA256
581174aeb94c12f9e9fcf29d6c2b875323ff5285d12c6531bdccf9e81033b2ec
-
SHA512
22c0ed314f7346ae6f0e8f8e394462b7b5fbb647b94e06f3495d06103205a106fae21868816fd9e8765ea1faf222f66ed505717bce11a6f10bc04b164c7916c0
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXqc:7wqd87Vqc
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1500-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1500 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1500 1492 rundll32.exe 83 PID 1492 wrote to memory of 1500 1492 rundll32.exe 83 PID 1492 wrote to memory of 1500 1492 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\581174aeb94c12f9e9fcf29d6c2b875323ff5285d12c6531bdccf9e81033b2ec.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\581174aeb94c12f9e9fcf29d6c2b875323ff5285d12c6531bdccf9e81033b2ec.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1500
-