Analysis
-
max time kernel
144s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 21:36
Behavioral task
behavioral1
Sample
72e69e1d759a705a3037ed28707b9e519c7234a87a79d80a20b93013674ed490.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
72e69e1d759a705a3037ed28707b9e519c7234a87a79d80a20b93013674ed490.dll
-
Size
899KB
-
MD5
39982d0be593c578aeff14e0a4bbb96a
-
SHA1
06236344547ea2c792a7f6dafb93268d2204a0e5
-
SHA256
72e69e1d759a705a3037ed28707b9e519c7234a87a79d80a20b93013674ed490
-
SHA512
ba733205a00cea9fbef58723373233649fcb27a32119e9c0b021a669155af15532fb736af72389a8c4c2a1d76cb896b6e4fb28abb2266ed00bd7e85f2d3d6af9
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXm:7wqd87Vm
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3916-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3916 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3148 wrote to memory of 3916 3148 rundll32.exe 82 PID 3148 wrote to memory of 3916 3148 rundll32.exe 82 PID 3148 wrote to memory of 3916 3148 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72e69e1d759a705a3037ed28707b9e519c7234a87a79d80a20b93013674ed490.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72e69e1d759a705a3037ed28707b9e519c7234a87a79d80a20b93013674ed490.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3916
-