Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 21:43
Behavioral task
behavioral1
Sample
611f076e7405aefd3679bc3be63f08127217345f2d5bb058b7acd0af646ca8df.dll
Resource
win7-20240611-en
4 signatures
150 seconds
General
-
Target
611f076e7405aefd3679bc3be63f08127217345f2d5bb058b7acd0af646ca8df.dll
-
Size
899KB
-
MD5
f21a22de5d14da32c9b9aea2ebabf358
-
SHA1
54650112a2b09146a58e78f842df80c9bdda40d6
-
SHA256
611f076e7405aefd3679bc3be63f08127217345f2d5bb058b7acd0af646ca8df
-
SHA512
88238e1a446594ef6fea06042307392d95a63787ee391adaf925d66ee82c9ac2074ce967ecc3a87de7d63f75ec25b7b6586ac9c23d28595357526635652e4ffc
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXM:7wqd87VM
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/920-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 920 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3300 wrote to memory of 920 3300 rundll32.exe 82 PID 3300 wrote to memory of 920 3300 rundll32.exe 82 PID 3300 wrote to memory of 920 3300 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\611f076e7405aefd3679bc3be63f08127217345f2d5bb058b7acd0af646ca8df.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\611f076e7405aefd3679bc3be63f08127217345f2d5bb058b7acd0af646ca8df.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:920
-