Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 16:04
Behavioral task
behavioral1
Sample
b6ba6f697b93cadd7c338b57f3565bcc80e2a08d9d3b8da088671b3660e56502.dll
Resource
win7-20240508-en
4 signatures
150 seconds
General
-
Target
b6ba6f697b93cadd7c338b57f3565bcc80e2a08d9d3b8da088671b3660e56502.dll
-
Size
50KB
-
MD5
8179abb7ce328913bc72bafa1c1d5d7c
-
SHA1
ed06bd3a3be002c482c6399f558de389373e905b
-
SHA256
b6ba6f697b93cadd7c338b57f3565bcc80e2a08d9d3b8da088671b3660e56502
-
SHA512
5280aada2f7522103b83a22dd1bbd827593919814ac38e181c0ad8b780ab6bdee5f469efc139199288f0958f2a6a3714aa2b0e504a2169596238dd8f720c61b5
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5MJYH:W5ReWjTrW9rNPgYoGJYH
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3420-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3420 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1392 wrote to memory of 3420 1392 rundll32.exe 90 PID 1392 wrote to memory of 3420 1392 rundll32.exe 90 PID 1392 wrote to memory of 3420 1392 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6ba6f697b93cadd7c338b57f3565bcc80e2a08d9d3b8da088671b3660e56502.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b6ba6f697b93cadd7c338b57f3565bcc80e2a08d9d3b8da088671b3660e56502.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4224,i,16488180140590516186,11762960689811837350,262144 --variations-seed-version --mojo-platform-channel-handle=3836 /prefetch:81⤵PID:2512