Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 19:23
Behavioral task
behavioral1
Sample
6d0c5c17cb663b6841861c56964727235edf6f3b1e0632b5053864ca86c1608d.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
6d0c5c17cb663b6841861c56964727235edf6f3b1e0632b5053864ca86c1608d.dll
-
Size
51KB
-
MD5
2c03971c90688733a4419e47f0bff27c
-
SHA1
77b177ed37ef02f16f8a780e780b6f2019c60221
-
SHA256
6d0c5c17cb663b6841861c56964727235edf6f3b1e0632b5053864ca86c1608d
-
SHA512
53f38fc9d867a30942c58e736dc2c1515372b4dde8f078d787d9f15b167e6aceef1786c23d3ffb2a382875429bcf728aa166db669cda0e0fd76636199677774c
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLtJYH5:1dWubF3n9S91BF3fbopJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2072-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2072 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28 PID 2164 wrote to memory of 2072 2164 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d0c5c17cb663b6841861c56964727235edf6f3b1e0632b5053864ca86c1608d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6d0c5c17cb663b6841861c56964727235edf6f3b1e0632b5053864ca86c1608d.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2072
-