Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 11:34
Behavioral task
behavioral1
Sample
853899c4e1c965f0746aca7948ec8ffc4dc7afc1976deef40479a95c258860c9.dll
Resource
win7-20240419-en
4 signatures
150 seconds
General
-
Target
853899c4e1c965f0746aca7948ec8ffc4dc7afc1976deef40479a95c258860c9.dll
-
Size
899KB
-
MD5
6ad7b02c6d34b669c0a714f970615bac
-
SHA1
a70782e99c83e3df5cef6aa0dc6eb30eef7c5443
-
SHA256
853899c4e1c965f0746aca7948ec8ffc4dc7afc1976deef40479a95c258860c9
-
SHA512
413979b1098423c4612ad5ec8ecb3ed210f17b928210b32e8cd407d65bf893b4878dd7a54c15240b8303f79b6e2460427ad874cd4eb588ced91ed2c85ff1f666
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXc:7wqd87Vc
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3644-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3644 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4040 wrote to memory of 3644 4040 rundll32.exe 82 PID 4040 wrote to memory of 3644 4040 rundll32.exe 82 PID 4040 wrote to memory of 3644 4040 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\853899c4e1c965f0746aca7948ec8ffc4dc7afc1976deef40479a95c258860c9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\853899c4e1c965f0746aca7948ec8ffc4dc7afc1976deef40479a95c258860c9.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3644
-