Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 09:36
Behavioral task
behavioral1
Sample
b1c9374ee26ee555050734fece54fa743e186fb71dd65f927c17e78d78771cee.dll
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b1c9374ee26ee555050734fece54fa743e186fb71dd65f927c17e78d78771cee.dll
-
Size
50KB
-
MD5
762beb410edec2aa5596cb29c738a4f3
-
SHA1
08f43ed1fe7ca8581cb91409e12b8bbefc269045
-
SHA256
b1c9374ee26ee555050734fece54fa743e186fb71dd65f927c17e78d78771cee
-
SHA512
3f8fc9c2b78b22515a4de75fb8caa93dffee013166deb8f34ec9a1883eed5a15a182f18fde92fd84af7b1ed01a83d9f5550ade85658976d424afd352c1be620c
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5bJYH:W5ReWjTrW9rNPgYoRJYH
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2360-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2360 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2360 2652 rundll32.exe 31 PID 2652 wrote to memory of 2360 2652 rundll32.exe 31 PID 2652 wrote to memory of 2360 2652 rundll32.exe 31 PID 2652 wrote to memory of 2360 2652 rundll32.exe 31 PID 2652 wrote to memory of 2360 2652 rundll32.exe 31 PID 2652 wrote to memory of 2360 2652 rundll32.exe 31 PID 2652 wrote to memory of 2360 2652 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1c9374ee26ee555050734fece54fa743e186fb71dd65f927c17e78d78771cee.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1c9374ee26ee555050734fece54fa743e186fb71dd65f927c17e78d78771cee.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2360
-