Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 21:43
Behavioral task
behavioral1
Sample
53728f4707e4412ac57442d87556323a1316bd8931c02002edb7b826f8259871.dll
Resource
win7-20240611-en
4 signatures
150 seconds
General
-
Target
53728f4707e4412ac57442d87556323a1316bd8931c02002edb7b826f8259871.dll
-
Size
899KB
-
MD5
2fa6d6dacec0e12848c1704be25be35d
-
SHA1
4f634d12b2e168f9dce517284df877826440c71b
-
SHA256
53728f4707e4412ac57442d87556323a1316bd8931c02002edb7b826f8259871
-
SHA512
cbedb98078e91fc8da2caaf848f8fb619a3808ca5129da968023cd887bdfdd2a82c90baa39e7ee2df7e60d81eb9f9d8a5caecd133c5aaf78e837d01e2bd0c445
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXS:7wqd87VS
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2156-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2156 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3428 wrote to memory of 2156 3428 rundll32.exe 82 PID 3428 wrote to memory of 2156 3428 rundll32.exe 82 PID 3428 wrote to memory of 2156 3428 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53728f4707e4412ac57442d87556323a1316bd8931c02002edb7b826f8259871.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\53728f4707e4412ac57442d87556323a1316bd8931c02002edb7b826f8259871.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2156
-