Analysis
-
max time kernel
145s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 23:32
Behavioral task
behavioral1
Sample
f8d64616a9f786f13c73d86d6b1b8e4e8a2359f31e6534840f3ce214dba525ce.dll
Resource
win7-20240611-en
4 signatures
150 seconds
General
-
Target
f8d64616a9f786f13c73d86d6b1b8e4e8a2359f31e6534840f3ce214dba525ce.dll
-
Size
899KB
-
MD5
05044728c9513f0ce6b6f839794da78d
-
SHA1
ec06d819196db3949d9a8233bb3a8513be5333f1
-
SHA256
f8d64616a9f786f13c73d86d6b1b8e4e8a2359f31e6534840f3ce214dba525ce
-
SHA512
7387a76ab1b6eb63fbc5d63e5b316e9e66706715d45b0d299f399d0825501572ec8eda280c5c529751c4b7f61d7e78f5964fbf07baf17e170b5672d76dcc50da
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX4:7wqd87V4
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2484-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2484 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2484 2156 rundll32.exe 81 PID 2156 wrote to memory of 2484 2156 rundll32.exe 81 PID 2156 wrote to memory of 2484 2156 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8d64616a9f786f13c73d86d6b1b8e4e8a2359f31e6534840f3ce214dba525ce.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f8d64616a9f786f13c73d86d6b1b8e4e8a2359f31e6534840f3ce214dba525ce.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2484
-