Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 03:40
Behavioral task
behavioral1
Sample
8e300c9377d77842f64c641a3f2c23396b05c7f4d54f90e14327c3180b2f24bf.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
8e300c9377d77842f64c641a3f2c23396b05c7f4d54f90e14327c3180b2f24bf.dll
-
Size
51KB
-
MD5
bc87f5ac1e9c710fcb28684d86ccc801
-
SHA1
1955e555715adb931c4bc3ed47346a9500951b98
-
SHA256
8e300c9377d77842f64c641a3f2c23396b05c7f4d54f90e14327c3180b2f24bf
-
SHA512
7ec5936ab0a0453824c0d157c2a2a163893b560f1f4c636a4160709caee02f44818f4f8dc772346ed0cef10a1306111c199fc356891f6834b97045c165195593
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLjJYH5:1dWubF3n9S91BF3fbovJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3120-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3120 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3300 wrote to memory of 3120 3300 rundll32.exe 87 PID 3300 wrote to memory of 3120 3300 rundll32.exe 87 PID 3300 wrote to memory of 3120 3300 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e300c9377d77842f64c641a3f2c23396b05c7f4d54f90e14327c3180b2f24bf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e300c9377d77842f64c641a3f2c23396b05c7f4d54f90e14327c3180b2f24bf.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1040,i,15316930299780304231,7592852768794498680,262144 --variations-seed-version --mojo-platform-channel-handle=4496 /prefetch:81⤵PID:4736