Analysis
-
max time kernel
140s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 08:07
Behavioral task
behavioral1
Sample
5eec710b8cad95657183891c1f4071f86cd22f2f14d9f5d5cf13d9f7766dedc1.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
5eec710b8cad95657183891c1f4071f86cd22f2f14d9f5d5cf13d9f7766dedc1.dll
-
Size
51KB
-
MD5
0da02081c339ba302b9a4a7a7fa21e67
-
SHA1
c4a1a09569f13ab68540b762e90c9e39edd191d4
-
SHA256
5eec710b8cad95657183891c1f4071f86cd22f2f14d9f5d5cf13d9f7766dedc1
-
SHA512
dae84f3318e5ffee91b84ee250342c0b69f92fe410c40b6459d5a492f6c46d7cba60f0cd2383b22a00a91786f21b4eef9ef1b8df053b15659635ef2dccc61f8b
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL4JYH5:1dWubF3n9S91BF3fboMJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2900-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2900 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2900 2876 rundll32.exe 28 PID 2876 wrote to memory of 2900 2876 rundll32.exe 28 PID 2876 wrote to memory of 2900 2876 rundll32.exe 28 PID 2876 wrote to memory of 2900 2876 rundll32.exe 28 PID 2876 wrote to memory of 2900 2876 rundll32.exe 28 PID 2876 wrote to memory of 2900 2876 rundll32.exe 28 PID 2876 wrote to memory of 2900 2876 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5eec710b8cad95657183891c1f4071f86cd22f2f14d9f5d5cf13d9f7766dedc1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5eec710b8cad95657183891c1f4071f86cd22f2f14d9f5d5cf13d9f7766dedc1.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2900
-