Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 17:37
Behavioral task
behavioral1
Sample
418bb84f15214f45e345a062d7b938c84dc54cd9382f712d2c13d2b80ecfc512.dll
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
418bb84f15214f45e345a062d7b938c84dc54cd9382f712d2c13d2b80ecfc512.dll
-
Size
899KB
-
MD5
e2603b71f6805395e5970d1abbcee4b6
-
SHA1
0929c41b7db85e7d27d02e9dad1e6563eede4347
-
SHA256
418bb84f15214f45e345a062d7b938c84dc54cd9382f712d2c13d2b80ecfc512
-
SHA512
1e775a5ade3341e5ea9a98a304d34819bcce4152604e383fe37bcc97d32cb472761ec2f1fe997c5767cd1871a9ab8a351e8f1fc854bd0e8b7faccb1341254bfd
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXi:7wqd87Vi
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1196-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1196 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1196 2088 rundll32.exe 28 PID 2088 wrote to memory of 1196 2088 rundll32.exe 28 PID 2088 wrote to memory of 1196 2088 rundll32.exe 28 PID 2088 wrote to memory of 1196 2088 rundll32.exe 28 PID 2088 wrote to memory of 1196 2088 rundll32.exe 28 PID 2088 wrote to memory of 1196 2088 rundll32.exe 28 PID 2088 wrote to memory of 1196 2088 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\418bb84f15214f45e345a062d7b938c84dc54cd9382f712d2c13d2b80ecfc512.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\418bb84f15214f45e345a062d7b938c84dc54cd9382f712d2c13d2b80ecfc512.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1196
-