Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 00:55
Behavioral task
behavioral1
Sample
8878847dc7e5439b63546598ddd7600a524cbb5b076fe7c7d5bd58322aef4f8f.dll
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
8878847dc7e5439b63546598ddd7600a524cbb5b076fe7c7d5bd58322aef4f8f.dll
-
Size
899KB
-
MD5
b9faaa006f2604efe7ed046a79cb0849
-
SHA1
b5df037cfd7e97ed249e8fc1ae7268d07188b544
-
SHA256
8878847dc7e5439b63546598ddd7600a524cbb5b076fe7c7d5bd58322aef4f8f
-
SHA512
5a988da9fa69e4b4a20611914c13ddac6a6079707aaa57f30bc72cb9b861c54f47484bc32ad03c52c40871e9e2ca8921e56f49592f5bc22e50a910f7c1e0feba
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXz:7wqd87Vz
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/412-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 412 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4744 wrote to memory of 412 4744 rundll32.exe 84 PID 4744 wrote to memory of 412 4744 rundll32.exe 84 PID 4744 wrote to memory of 412 4744 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8878847dc7e5439b63546598ddd7600a524cbb5b076fe7c7d5bd58322aef4f8f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8878847dc7e5439b63546598ddd7600a524cbb5b076fe7c7d5bd58322aef4f8f.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:412
-