Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 13:29
Behavioral task
behavioral1
Sample
1931f6700bc57b418f8c2ee3c4575e86dec5c75b69dbe5df0e1631294fd4fe22.dll
Resource
win7-20240508-en
4 signatures
150 seconds
General
-
Target
1931f6700bc57b418f8c2ee3c4575e86dec5c75b69dbe5df0e1631294fd4fe22.dll
-
Size
51KB
-
MD5
1b35462b45e75c0783171b4c680e6f0c
-
SHA1
3db2909696b59872d1095c7b8c8b788422ec5066
-
SHA256
1931f6700bc57b418f8c2ee3c4575e86dec5c75b69dbe5df0e1631294fd4fe22
-
SHA512
086a3fd5ac43007624c2e6ab28bab55622889021d93d0cdc212d925418082cd7fea0e7fa524e7ee86090ea1e8870e4071a64a038f922e57174cd736d3fb953ac
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLGJYH5:1dWubF3n9S91BF3fboiJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3712-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3712 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 824 wrote to memory of 3712 824 rundll32.exe 92 PID 824 wrote to memory of 3712 824 rundll32.exe 92 PID 824 wrote to memory of 3712 824 rundll32.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1931f6700bc57b418f8c2ee3c4575e86dec5c75b69dbe5df0e1631294fd4fe22.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1931f6700bc57b418f8c2ee3c4575e86dec5c75b69dbe5df0e1631294fd4fe22.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:3520