Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 18:55
Behavioral task
behavioral1
Sample
89eba96dc6ed29d21ada2c5eb301137ece3c7c4ed307f9450dd5f6ee2e211686.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
89eba96dc6ed29d21ada2c5eb301137ece3c7c4ed307f9450dd5f6ee2e211686.dll
-
Size
899KB
-
MD5
f383a7938fb9cc964c368739ae7bc9a0
-
SHA1
ef78bbbd5bc2b6713bd83dbf1e2f86a84248fba4
-
SHA256
89eba96dc6ed29d21ada2c5eb301137ece3c7c4ed307f9450dd5f6ee2e211686
-
SHA512
9dffc2b6c0cddeccdb7cfa03374b81a6439b07c8dca2a3de1c004c1f50216c2b92caadfdc42df39685ad1e76c167f524f9830fbf79b0b2cf4daddbf6c48f7f2f
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXY:7wqd87VY
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2396-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2396 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2396 1720 rundll32.exe 28 PID 1720 wrote to memory of 2396 1720 rundll32.exe 28 PID 1720 wrote to memory of 2396 1720 rundll32.exe 28 PID 1720 wrote to memory of 2396 1720 rundll32.exe 28 PID 1720 wrote to memory of 2396 1720 rundll32.exe 28 PID 1720 wrote to memory of 2396 1720 rundll32.exe 28 PID 1720 wrote to memory of 2396 1720 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89eba96dc6ed29d21ada2c5eb301137ece3c7c4ed307f9450dd5f6ee2e211686.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89eba96dc6ed29d21ada2c5eb301137ece3c7c4ed307f9450dd5f6ee2e211686.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2396
-