Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 08:29
Behavioral task
behavioral1
Sample
86ed21d0a14c417e9cb9e23b9dcdb37fa87f7ae62ef64bba464b01cac1631e23.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
86ed21d0a14c417e9cb9e23b9dcdb37fa87f7ae62ef64bba464b01cac1631e23.dll
-
Size
51KB
-
MD5
db88dc4b1b57ac7787248bd952d6134b
-
SHA1
47f2d3d470755e7e3101fc818b4200413d5eb2ca
-
SHA256
86ed21d0a14c417e9cb9e23b9dcdb37fa87f7ae62ef64bba464b01cac1631e23
-
SHA512
e733d9554ccca0e67e18562fef52439ffcdc7dc5e1b11a82455fe1868813d54a92017108325b431d94789ab16a0d76c89b91d12576b2926228ae2862a4521740
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLJJYH5:1dWubF3n9S91BF3fbo1JYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3924-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3924 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 224 wrote to memory of 3924 224 rundll32.exe 82 PID 224 wrote to memory of 3924 224 rundll32.exe 82 PID 224 wrote to memory of 3924 224 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86ed21d0a14c417e9cb9e23b9dcdb37fa87f7ae62ef64bba464b01cac1631e23.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86ed21d0a14c417e9cb9e23b9dcdb37fa87f7ae62ef64bba464b01cac1631e23.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3924
-