Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 18:45
Behavioral task
behavioral1
Sample
a0fa5abee82fc4aa4cfd7df2a6e24ac067a477488e946f142f3a062bc35b056b.dll
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
a0fa5abee82fc4aa4cfd7df2a6e24ac067a477488e946f142f3a062bc35b056b.dll
-
Size
51KB
-
MD5
063650ca3fa438f5166efaf4911b880f
-
SHA1
ce74033425885ee27f3b5d6e2638ddd8c1cc004d
-
SHA256
a0fa5abee82fc4aa4cfd7df2a6e24ac067a477488e946f142f3a062bc35b056b
-
SHA512
c6e9daea8769fb310afaaf9f09e9e9e31c5eb9db88b476f42a0afd4e5fb86ef085ad3172f69f2a729c2839cbae39526f60456db5adf35bd1c4983600f1a64f18
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLTJYH5:1dWubF3n9S91BF3fboHJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2020-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2020 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3328 wrote to memory of 2020 3328 rundll32.exe 89 PID 3328 wrote to memory of 2020 3328 rundll32.exe 89 PID 3328 wrote to memory of 2020 3328 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0fa5abee82fc4aa4cfd7df2a6e24ac067a477488e946f142f3a062bc35b056b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0fa5abee82fc4aa4cfd7df2a6e24ac067a477488e946f142f3a062bc35b056b.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4108,i,8998666007764333392,14724298544432336038,262144 --variations-seed-version --mojo-platform-channel-handle=4444 /prefetch:81⤵PID:4932