Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 10:01
Behavioral task
behavioral1
Sample
b7c81586cb6ed55cff89372465cfda389d37a4dcfc35bd4d2a3f53d479d15d2e.dll
Resource
win7-20240705-en
4 signatures
150 seconds
General
-
Target
b7c81586cb6ed55cff89372465cfda389d37a4dcfc35bd4d2a3f53d479d15d2e.dll
-
Size
899KB
-
MD5
6005641a741bff2fc0f066584570e0c7
-
SHA1
8d46a7e3997c6a4eebf9aab7d95c3df244c626a6
-
SHA256
b7c81586cb6ed55cff89372465cfda389d37a4dcfc35bd4d2a3f53d479d15d2e
-
SHA512
196e13abec700b7a95044fe9cea934e3541ed0f601e4364f0631fb13ab6c854d6e65c80a711dff77c345426f2531dfde51e4086ec5fd23bd60cabc6cf1586365
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PX9:7wqd87V9
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2496-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2496 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4120 wrote to memory of 2496 4120 rundll32.exe 84 PID 4120 wrote to memory of 2496 4120 rundll32.exe 84 PID 4120 wrote to memory of 2496 4120 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7c81586cb6ed55cff89372465cfda389d37a4dcfc35bd4d2a3f53d479d15d2e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b7c81586cb6ed55cff89372465cfda389d37a4dcfc35bd4d2a3f53d479d15d2e.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:2496
-