Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 16:04
Behavioral task
behavioral1
Sample
b6ba6f697b93cadd7c338b57f3565bcc80e2a08d9d3b8da088671b3660e56502.dll
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b6ba6f697b93cadd7c338b57f3565bcc80e2a08d9d3b8da088671b3660e56502.dll
-
Size
50KB
-
MD5
8179abb7ce328913bc72bafa1c1d5d7c
-
SHA1
ed06bd3a3be002c482c6399f558de389373e905b
-
SHA256
b6ba6f697b93cadd7c338b57f3565bcc80e2a08d9d3b8da088671b3660e56502
-
SHA512
5280aada2f7522103b83a22dd1bbd827593919814ac38e181c0ad8b780ab6bdee5f469efc139199288f0958f2a6a3714aa2b0e504a2169596238dd8f720c61b5
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5MJYH:W5ReWjTrW9rNPgYoGJYH
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2108-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2108 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2108 2228 rundll32.exe 28 PID 2228 wrote to memory of 2108 2228 rundll32.exe 28 PID 2228 wrote to memory of 2108 2228 rundll32.exe 28 PID 2228 wrote to memory of 2108 2228 rundll32.exe 28 PID 2228 wrote to memory of 2108 2228 rundll32.exe 28 PID 2228 wrote to memory of 2108 2228 rundll32.exe 28 PID 2228 wrote to memory of 2108 2228 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6ba6f697b93cadd7c338b57f3565bcc80e2a08d9d3b8da088671b3660e56502.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6ba6f697b93cadd7c338b57f3565bcc80e2a08d9d3b8da088671b3660e56502.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2108
-