Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 01:22
Behavioral task
behavioral1
Sample
bf2833b7a432feef119bde66ef170eb221913ed13e5be5b251d8a717445ecf25.dll
Resource
win7-20240419-en
4 signatures
150 seconds
General
-
Target
bf2833b7a432feef119bde66ef170eb221913ed13e5be5b251d8a717445ecf25.dll
-
Size
899KB
-
MD5
d87068bbcb7b5dc1a25c27aefe21eb5b
-
SHA1
7b3cb5a89d617072dd30d5eba300ea6ef979345e
-
SHA256
bf2833b7a432feef119bde66ef170eb221913ed13e5be5b251d8a717445ecf25
-
SHA512
b27ed6a26bdeb58a377b9c631b756309933ab02c1a09d5514274dd0914e8431a3f951f14378c95062ef21bb5acf641dd7d1679aee5e45f549efadd46f8d66197
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXi:7wqd87Vi
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/412-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 412 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2180 wrote to memory of 412 2180 rundll32.exe 83 PID 2180 wrote to memory of 412 2180 rundll32.exe 83 PID 2180 wrote to memory of 412 2180 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf2833b7a432feef119bde66ef170eb221913ed13e5be5b251d8a717445ecf25.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf2833b7a432feef119bde66ef170eb221913ed13e5be5b251d8a717445ecf25.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:412
-