Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 09:01
Behavioral task
behavioral1
Sample
8b4196dc93026f07ac6af470c156c8431484c8d2625765f3c17987923dfe536e.dll
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
8b4196dc93026f07ac6af470c156c8431484c8d2625765f3c17987923dfe536e.dll
-
Size
51KB
-
MD5
c8201a1206497e951b3b200e50f90f4d
-
SHA1
d58bad349c4e4e5885214e79edb1b4aeb8f603cc
-
SHA256
8b4196dc93026f07ac6af470c156c8431484c8d2625765f3c17987923dfe536e
-
SHA512
8a1fceed4025594ff1c47b2400c2de60965a5a708ff89cec963fcbdc8ad2786a24616b7836312d91ca5810e2d3e84ef786598c1d341539a5d69a7905855fbd17
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLaJYH5:1dWubF3n9S91BF3fbo+JYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4476-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4476 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3252 wrote to memory of 4476 3252 rundll32.exe 84 PID 3252 wrote to memory of 4476 3252 rundll32.exe 84 PID 3252 wrote to memory of 4476 3252 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b4196dc93026f07ac6af470c156c8431484c8d2625765f3c17987923dfe536e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b4196dc93026f07ac6af470c156c8431484c8d2625765f3c17987923dfe536e.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4476
-