Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 21:43
Behavioral task
behavioral1
Sample
a6cc4fa332397ea238027eb78c67b848e56f710b69ba232130c63913d3b5e21d.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
a6cc4fa332397ea238027eb78c67b848e56f710b69ba232130c63913d3b5e21d.dll
-
Size
899KB
-
MD5
ba0b21dd919823fa70bdf5e0d7f5796b
-
SHA1
d0d3dac17e95216e1a68d5834bf9e54fb25cbac5
-
SHA256
a6cc4fa332397ea238027eb78c67b848e56f710b69ba232130c63913d3b5e21d
-
SHA512
85f12f884ac2fb04b39e9e3de150a8b0cf17d835924067872098ef253579ef4eacd89af4682a1fe517eeece06261f43a18ed9dc205193f6a0886e63ae4871019
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXT:7wqd87VT
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1328-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1328 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1328 2616 rundll32.exe 90 PID 2616 wrote to memory of 1328 2616 rundll32.exe 90 PID 2616 wrote to memory of 1328 2616 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6cc4fa332397ea238027eb78c67b848e56f710b69ba232130c63913d3b5e21d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6cc4fa332397ea238027eb78c67b848e56f710b69ba232130c63913d3b5e21d.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4040,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:81⤵PID:544