Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 02:36
Behavioral task
behavioral1
Sample
3d6b7ac159e32d8ab8aaae342a5de591fef3c4a9dd705b3cf03da567da364eb1.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
3d6b7ac159e32d8ab8aaae342a5de591fef3c4a9dd705b3cf03da567da364eb1.dll
-
Size
899KB
-
MD5
ee20da83af989ed89da32208d5a2f4e6
-
SHA1
2d611aed3a45d3ce4559a446553c397ac2033569
-
SHA256
3d6b7ac159e32d8ab8aaae342a5de591fef3c4a9dd705b3cf03da567da364eb1
-
SHA512
173cadb2532f1dd10bfaaeef8155a9f50e0181cc09a346b5b61d1c8b889e099cc236167f3548760c776f48c7bfca9edab581a08563ecc9fd97e176467912fc77
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXG:7wqd87VG
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3664-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3664 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 828 wrote to memory of 3664 828 rundll32.exe 82 PID 828 wrote to memory of 3664 828 rundll32.exe 82 PID 828 wrote to memory of 3664 828 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d6b7ac159e32d8ab8aaae342a5de591fef3c4a9dd705b3cf03da567da364eb1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d6b7ac159e32d8ab8aaae342a5de591fef3c4a9dd705b3cf03da567da364eb1.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3664
-