Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 18:38
Behavioral task
behavioral1
Sample
56c3d8208b83ba45ff75398e61a32f079f6488931291b40a5277e3c01f519e41.dll
Resource
win7-20240611-en
4 signatures
150 seconds
General
-
Target
56c3d8208b83ba45ff75398e61a32f079f6488931291b40a5277e3c01f519e41.dll
-
Size
899KB
-
MD5
c28731e34cee1412dab6ef3839555366
-
SHA1
5e6d72d8f8ef350c5a62ca69f4f946fc75610a94
-
SHA256
56c3d8208b83ba45ff75398e61a32f079f6488931291b40a5277e3c01f519e41
-
SHA512
5a67eb05af01db5f80861db802597313e3b2dce61598a378e7763a0a6307d68e1b67dc11ead36ba28cfe3cd84df3248733e281bf8655c8cf8c6a9c6618c0e1ec
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXy:7wqd87Vy
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4424-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4424 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 4424 1648 rundll32.exe 81 PID 1648 wrote to memory of 4424 1648 rundll32.exe 81 PID 1648 wrote to memory of 4424 1648 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56c3d8208b83ba45ff75398e61a32f079f6488931291b40a5277e3c01f519e41.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56c3d8208b83ba45ff75398e61a32f079f6488931291b40a5277e3c01f519e41.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4424
-