Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 11:05

General

  • Target

    0e3c8a316eef7136c4a1ed360f211519b27d7b59c606ca2bc2d56819f337ae23.dll

  • Size

    51KB

  • MD5

    c296b0f97d3f9fcb42a84172deec7b51

  • SHA1

    d23b2edef08e0bbf583c212e51e0dfd9dc6534e0

  • SHA256

    0e3c8a316eef7136c4a1ed360f211519b27d7b59c606ca2bc2d56819f337ae23

  • SHA512

    56b1719bffff5632831da60948ccd96165cc25fe89a3b63f943372496dfc68c7cf7da933208404b97dbad18fcede770a2a2b74887e3c7daa4f4db317f7cb862e

  • SSDEEP

    1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL/JYH5:1dWubF3n9S91BF3fbobJYH5

Score
10/10

Malware Config

Extracted

Family

gh0strat

C2

kinh.xmcxmr.com

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0e3c8a316eef7136c4a1ed360f211519b27d7b59c606ca2bc2d56819f337ae23.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0e3c8a316eef7136c4a1ed360f211519b27d7b59c606ca2bc2d56819f337ae23.dll,#1
      2⤵
      • Suspicious behavior: RenamesItself
      PID:2748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2748-0-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB