Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-06-2024 18:49
Behavioral task
behavioral1
Sample
ee99daa6fa61c64ddd99a26db85e38f0a933c867e736dac14f1eacf070585839.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
ee99daa6fa61c64ddd99a26db85e38f0a933c867e736dac14f1eacf070585839.dll
-
Size
899KB
-
MD5
f98d9e27ad648706788b4f31064878a8
-
SHA1
2cf8b8f4b6214caf1258a546226818e1923dae84
-
SHA256
ee99daa6fa61c64ddd99a26db85e38f0a933c867e736dac14f1eacf070585839
-
SHA512
a3e811a2b08b0a9481b2cd186eaee9777937f8a27efa572a04c528417bf9743a934b484a406544aab4f832b524ca1fd27a5b4f311f38b2434ba8317d831bdf0f
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXa:7wqd87Va
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2160-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2160 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2160 2104 rundll32.exe 28 PID 2104 wrote to memory of 2160 2104 rundll32.exe 28 PID 2104 wrote to memory of 2160 2104 rundll32.exe 28 PID 2104 wrote to memory of 2160 2104 rundll32.exe 28 PID 2104 wrote to memory of 2160 2104 rundll32.exe 28 PID 2104 wrote to memory of 2160 2104 rundll32.exe 28 PID 2104 wrote to memory of 2160 2104 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee99daa6fa61c64ddd99a26db85e38f0a933c867e736dac14f1eacf070585839.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee99daa6fa61c64ddd99a26db85e38f0a933c867e736dac14f1eacf070585839.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2160
-