Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 22:40
Behavioral task
behavioral1
Sample
89e94222af37f16ad1c17801bb04ce961834fbe8e48dc713ec80c520ce64e9b9.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
89e94222af37f16ad1c17801bb04ce961834fbe8e48dc713ec80c520ce64e9b9.dll
-
Size
899KB
-
MD5
b7d3a51c89a377eb46db96c90fd6510e
-
SHA1
3175c999fb6eb0ce49eb954b0a46d817bb5c3d0a
-
SHA256
89e94222af37f16ad1c17801bb04ce961834fbe8e48dc713ec80c520ce64e9b9
-
SHA512
dc5461425bd06656387380dffac81e0e17584058380d615b8e881b738f381662dc31a4166e8284c12f76adc87b4be60aa5284f676e781640c687a7e0f447d52c
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXv:7wqd87Vv
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1156-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1156 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 1156 4572 rundll32.exe 80 PID 4572 wrote to memory of 1156 4572 rundll32.exe 80 PID 4572 wrote to memory of 1156 4572 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89e94222af37f16ad1c17801bb04ce961834fbe8e48dc713ec80c520ce64e9b9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89e94222af37f16ad1c17801bb04ce961834fbe8e48dc713ec80c520ce64e9b9.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1156
-