Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 09:17
Behavioral task
behavioral1
Sample
ed6db61b726fbcdfcb42fad05dd1993a3212b344dc3ebbdf37f3da4158c1530c.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
ed6db61b726fbcdfcb42fad05dd1993a3212b344dc3ebbdf37f3da4158c1530c.dll
-
Size
899KB
-
MD5
8745b581612568b227ff7b700c48f31a
-
SHA1
8b8bd13afc7d0dce69b8108f5a75a640aa2c1a2d
-
SHA256
ed6db61b726fbcdfcb42fad05dd1993a3212b344dc3ebbdf37f3da4158c1530c
-
SHA512
76af268abbb3c4c05cd4002a848d076ca4dc302913465388e56aee5d212897bf5c651f535511bac47576e5d13dd999733509a18b18041540ad2b5aeae52b1431
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXZ:7wqd87VZ
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/5008-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5008 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1836 wrote to memory of 5008 1836 rundll32.exe 85 PID 1836 wrote to memory of 5008 1836 rundll32.exe 85 PID 1836 wrote to memory of 5008 1836 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed6db61b726fbcdfcb42fad05dd1993a3212b344dc3ebbdf37f3da4158c1530c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed6db61b726fbcdfcb42fad05dd1993a3212b344dc3ebbdf37f3da4158c1530c.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:5008
-