Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 22:38
Behavioral task
behavioral1
Sample
fa51a305c331638a15d473d4da2be565fe2a23d3f1ce0a9695e49a4cca5d5780.dll
Resource
win7-20240508-en
4 signatures
150 seconds
General
-
Target
fa51a305c331638a15d473d4da2be565fe2a23d3f1ce0a9695e49a4cca5d5780.dll
-
Size
51KB
-
MD5
5bc553e8bc77c0686010f4a719605092
-
SHA1
27d8edacda9a6a4d62f5ede8b1c7cf5b03e455f5
-
SHA256
fa51a305c331638a15d473d4da2be565fe2a23d3f1ce0a9695e49a4cca5d5780
-
SHA512
44888eb7825c81bcb1fb7e91671e2154df4aca8c043871c10ca1b3a0b481c5f18ca600393697c9eef7fb842156bbb6fa92a033647f335d1e2aa8386084bc8a04
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLQJYH5:1dWubF3n9S91BF3fboEJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2480-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2480 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28 PID 2416 wrote to memory of 2480 2416 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa51a305c331638a15d473d4da2be565fe2a23d3f1ce0a9695e49a4cca5d5780.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa51a305c331638a15d473d4da2be565fe2a23d3f1ce0a9695e49a4cca5d5780.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2480
-