Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 18:29
Behavioral task
behavioral1
Sample
abb6758f282976ac9ef260a01b0d8a73be5c19b2f59c3d5ea480099688b2ad06.dll
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
abb6758f282976ac9ef260a01b0d8a73be5c19b2f59c3d5ea480099688b2ad06.dll
-
Size
50KB
-
MD5
655120a42b2546d9acb465051703858b
-
SHA1
3224329b74f12c0a5baa841efbdb05020bcd9bc1
-
SHA256
abb6758f282976ac9ef260a01b0d8a73be5c19b2f59c3d5ea480099688b2ad06
-
SHA512
b9fa2ea02c7b55545078f7650aff7b207d579aa122f203aa2e6c2d6f969ac19673f97ede8642941ea8acf52d0862b29f18208f7f5e9bd98f37561efcb20b86a8
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5bJYH:W5ReWjTrW9rNPgYoBJYH
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2188-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2188 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3124 wrote to memory of 2188 3124 rundll32.exe 82 PID 3124 wrote to memory of 2188 3124 rundll32.exe 82 PID 3124 wrote to memory of 2188 3124 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\abb6758f282976ac9ef260a01b0d8a73be5c19b2f59c3d5ea480099688b2ad06.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\abb6758f282976ac9ef260a01b0d8a73be5c19b2f59c3d5ea480099688b2ad06.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2188
-