Analysis
-
max time kernel
110s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 14:01
Behavioral task
behavioral1
Sample
bd1834d04210b18db7032ecd42b3b360N.dll
Resource
win7-20240705-en
4 signatures
120 seconds
General
-
Target
bd1834d04210b18db7032ecd42b3b360N.dll
-
Size
51KB
-
MD5
bd1834d04210b18db7032ecd42b3b360
-
SHA1
2b639e6fd874579540a92eae9d3a9fd7060b9a29
-
SHA256
3ec9f634f147ac8aff2f2316e076d456873ad74f706c97648ccaf1fb092f81ba
-
SHA512
ebb1c020cebdbf736ee02d407ae1fdd6d1d4b5b2548d199f4e2b8e0950d22a96dbad4749d92ec17488c267ad1deec357e79b028f022a96839805fce47315bba3
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLDJYH5:1dWubF3n9S91BF3fbo3JYH5
Malware Config
Extracted
Family
gh0strat
C2
kinh.xmcxmr.com
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3860-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3860 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3860 4124 rundll32.exe 84 PID 4124 wrote to memory of 3860 4124 rundll32.exe 84 PID 4124 wrote to memory of 3860 4124 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd1834d04210b18db7032ecd42b3b360N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd1834d04210b18db7032ecd42b3b360N.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:3860
-