Analysis
-
max time kernel
146s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 14:01
Behavioral task
behavioral1
Sample
956e33528804d0886b1d8b0041207bb1704c53dbab0de3291897020b640ba2c1.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
956e33528804d0886b1d8b0041207bb1704c53dbab0de3291897020b640ba2c1.dll
-
Size
51KB
-
MD5
5ab7809479272d88504658d97ed48dc3
-
SHA1
5bc7072dd4cafd0225ffb38891a83e980183943a
-
SHA256
956e33528804d0886b1d8b0041207bb1704c53dbab0de3291897020b640ba2c1
-
SHA512
01ecad5ba11ef357a1f93eb64678acf18512a84d6df78d3d1e7521a1573aeb77c050e0ebc91463c73cb671ad450dd09727e9346506cee6dcd9690a6120ab500a
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLtJYH5:1dWubF3n9S91BF3fbo5JYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4040-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4040 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4040 5036 rundll32.exe 83 PID 5036 wrote to memory of 4040 5036 rundll32.exe 83 PID 5036 wrote to memory of 4040 5036 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\956e33528804d0886b1d8b0041207bb1704c53dbab0de3291897020b640ba2c1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\956e33528804d0886b1d8b0041207bb1704c53dbab0de3291897020b640ba2c1.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4040
-