Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2024, 10:38
Behavioral task
behavioral1
Sample
4c4e6b520a48ead7c891ef2d0e631f27750eab3d017e81ce4617c43fe15ea009.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
4c4e6b520a48ead7c891ef2d0e631f27750eab3d017e81ce4617c43fe15ea009.dll
-
Size
50KB
-
MD5
d254c049e0746e0d69a53f2914d9c068
-
SHA1
a3b340f9ed9753d20fc99f2e423a0da95452af2c
-
SHA256
4c4e6b520a48ead7c891ef2d0e631f27750eab3d017e81ce4617c43fe15ea009
-
SHA512
3dbacaf871afd5b92225af6507751638988d848c6d10fc9cb65c57d97f6ac6c92ba2d56ea08dcd3075d427ea6c705c0bcd89b4862d9e4ee5dd2743fef960a11f
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5qJYH:W5ReWjTrW9rNPgYo0JYH
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1012-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1012 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1012 3036 rundll32.exe 81 PID 3036 wrote to memory of 1012 3036 rundll32.exe 81 PID 3036 wrote to memory of 1012 3036 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c4e6b520a48ead7c891ef2d0e631f27750eab3d017e81ce4617c43fe15ea009.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c4e6b520a48ead7c891ef2d0e631f27750eab3d017e81ce4617c43fe15ea009.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1012
-