Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 18:14
Behavioral task
behavioral1
Sample
8ac8cbe9f46f3360cd476403ff85f4f62175e1b6dbc49330d1722cb02a792a2e.dll
Resource
win7-20240611-en
4 signatures
150 seconds
General
-
Target
8ac8cbe9f46f3360cd476403ff85f4f62175e1b6dbc49330d1722cb02a792a2e.dll
-
Size
899KB
-
MD5
fbfc715aabfb5d8c49e9db4ef3bac00f
-
SHA1
7cdf1b8ef6203404697b97f84965f1940c232303
-
SHA256
8ac8cbe9f46f3360cd476403ff85f4f62175e1b6dbc49330d1722cb02a792a2e
-
SHA512
ba7e40b4181915fc537d9176caaf5b462749e3cf53be03cbf07df1100bbecebeb8c8a68e39378c6905783734ea22429f937d7c8742cd661c1fbee96dbac3fb0e
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXG:7wqd87VG
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2388-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2388 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2388 1080 rundll32.exe 28 PID 1080 wrote to memory of 2388 1080 rundll32.exe 28 PID 1080 wrote to memory of 2388 1080 rundll32.exe 28 PID 1080 wrote to memory of 2388 1080 rundll32.exe 28 PID 1080 wrote to memory of 2388 1080 rundll32.exe 28 PID 1080 wrote to memory of 2388 1080 rundll32.exe 28 PID 1080 wrote to memory of 2388 1080 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ac8cbe9f46f3360cd476403ff85f4f62175e1b6dbc49330d1722cb02a792a2e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ac8cbe9f46f3360cd476403ff85f4f62175e1b6dbc49330d1722cb02a792a2e.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2388
-