Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 09:36
Behavioral task
behavioral1
Sample
b1c9374ee26ee555050734fece54fa743e186fb71dd65f927c17e78d78771cee.dll
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
General
-
Target
b1c9374ee26ee555050734fece54fa743e186fb71dd65f927c17e78d78771cee.dll
-
Size
50KB
-
MD5
762beb410edec2aa5596cb29c738a4f3
-
SHA1
08f43ed1fe7ca8581cb91409e12b8bbefc269045
-
SHA256
b1c9374ee26ee555050734fece54fa743e186fb71dd65f927c17e78d78771cee
-
SHA512
3f8fc9c2b78b22515a4de75fb8caa93dffee013166deb8f34ec9a1883eed5a15a182f18fde92fd84af7b1ed01a83d9f5550ade85658976d424afd352c1be620c
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5bJYH:W5ReWjTrW9rNPgYoRJYH
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3228-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3228 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1504 wrote to memory of 3228 1504 rundll32.exe 85 PID 1504 wrote to memory of 3228 1504 rundll32.exe 85 PID 1504 wrote to memory of 3228 1504 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1c9374ee26ee555050734fece54fa743e186fb71dd65f927c17e78d78771cee.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b1c9374ee26ee555050734fece54fa743e186fb71dd65f927c17e78d78771cee.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3228
-