Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 22:32
Behavioral task
behavioral1
Sample
641b5bedda4e1c105eadc43f130846b81c1ec6c5d8739716ab82182758da45af.dll
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
641b5bedda4e1c105eadc43f130846b81c1ec6c5d8739716ab82182758da45af.dll
-
Size
899KB
-
MD5
1a30acc11cced13dc46842ee360288b8
-
SHA1
280109205bdff3f27c0e009e9a1acff2f3a49766
-
SHA256
641b5bedda4e1c105eadc43f130846b81c1ec6c5d8739716ab82182758da45af
-
SHA512
40583f70ccbe4bb52c45924b97d2f627e3661f4e4ca5e23b6fe955e044c171db370289bb00b06430695a79ec8a36a86cd72aed1702757ad77f34ba016a5ac600
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXM:7wqd87VM
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2164-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2164 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1376 wrote to memory of 2164 1376 rundll32.exe 28 PID 1376 wrote to memory of 2164 1376 rundll32.exe 28 PID 1376 wrote to memory of 2164 1376 rundll32.exe 28 PID 1376 wrote to memory of 2164 1376 rundll32.exe 28 PID 1376 wrote to memory of 2164 1376 rundll32.exe 28 PID 1376 wrote to memory of 2164 1376 rundll32.exe 28 PID 1376 wrote to memory of 2164 1376 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\641b5bedda4e1c105eadc43f130846b81c1ec6c5d8739716ab82182758da45af.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\641b5bedda4e1c105eadc43f130846b81c1ec6c5d8739716ab82182758da45af.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2164
-