Analysis
-
max time kernel
140s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 07:49
Behavioral task
behavioral1
Sample
ad3dd7b51fceb0ff04d2bdbf1900c0c6523af25a4bea2263af7e516f7d6cf495.dll
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
General
-
Target
ad3dd7b51fceb0ff04d2bdbf1900c0c6523af25a4bea2263af7e516f7d6cf495.dll
-
Size
51KB
-
MD5
d1e4316e95f7c3f9baae83ffcadc61f9
-
SHA1
c951491c200a0ab078279d1fa2613c91a8ea7192
-
SHA256
ad3dd7b51fceb0ff04d2bdbf1900c0c6523af25a4bea2263af7e516f7d6cf495
-
SHA512
2081013e7fd754b86c031a8f48741242de16598680746544421eb92c6d505f23afcb6c56d6f875194b39f06a363e2b171819216cb1d25c562c350f387bc467a8
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLbJYH5:1dWubF3n9S91BF3fboPJYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1948-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1948 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1948 2240 rundll32.exe 28 PID 2240 wrote to memory of 1948 2240 rundll32.exe 28 PID 2240 wrote to memory of 1948 2240 rundll32.exe 28 PID 2240 wrote to memory of 1948 2240 rundll32.exe 28 PID 2240 wrote to memory of 1948 2240 rundll32.exe 28 PID 2240 wrote to memory of 1948 2240 rundll32.exe 28 PID 2240 wrote to memory of 1948 2240 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad3dd7b51fceb0ff04d2bdbf1900c0c6523af25a4bea2263af7e516f7d6cf495.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad3dd7b51fceb0ff04d2bdbf1900c0c6523af25a4bea2263af7e516f7d6cf495.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1948
-