Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 19:12
Behavioral task
behavioral1
Sample
2733104e78ff1934fcb8dfe2465e73ed90f5c89e0d4d533218c4725a8e3870ab.dll
Resource
win7-20240705-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2733104e78ff1934fcb8dfe2465e73ed90f5c89e0d4d533218c4725a8e3870ab.dll
-
Size
899KB
-
MD5
fe303bf61ff9de80d78e2f61d5d3c9a2
-
SHA1
aa923ff9d66efd3ebb179e00ce37164786f2aad7
-
SHA256
2733104e78ff1934fcb8dfe2465e73ed90f5c89e0d4d533218c4725a8e3870ab
-
SHA512
8e70ade595bdc2362eb2ab6179816bff0e3856d0786f679ed22c7888a2716fc3c655cf7e4d53cd63296ef2c9d136385f0879ea3cf7d39d6240b2d15af16a1e53
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXP:7wqd87VP
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1072-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1072 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2564 wrote to memory of 1072 2564 rundll32.exe 31 PID 2564 wrote to memory of 1072 2564 rundll32.exe 31 PID 2564 wrote to memory of 1072 2564 rundll32.exe 31 PID 2564 wrote to memory of 1072 2564 rundll32.exe 31 PID 2564 wrote to memory of 1072 2564 rundll32.exe 31 PID 2564 wrote to memory of 1072 2564 rundll32.exe 31 PID 2564 wrote to memory of 1072 2564 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2733104e78ff1934fcb8dfe2465e73ed90f5c89e0d4d533218c4725a8e3870ab.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2733104e78ff1934fcb8dfe2465e73ed90f5c89e0d4d533218c4725a8e3870ab.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:1072
-