Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 11:52
Behavioral task
behavioral1
Sample
d164632c82b4e2f79405574bf0975e42878b33606c40f8528c3cdb6b5e9a9218.dll
Resource
win7-20240705-en
4 signatures
150 seconds
General
-
Target
d164632c82b4e2f79405574bf0975e42878b33606c40f8528c3cdb6b5e9a9218.dll
-
Size
899KB
-
MD5
adb35b881bb9a0690d91c3e257aac5fc
-
SHA1
f6ce9079dde8681492b5b84674191b9684934b4d
-
SHA256
d164632c82b4e2f79405574bf0975e42878b33606c40f8528c3cdb6b5e9a9218
-
SHA512
a3b09970b7bba619e609aeeed5ec958a6e5e869c1c98c5a79bb740419311782ffb9b0b27421118f790a9b5dfe9e212d0444b1a358b3550de7ca38b476715454f
-
SSDEEP
24576:7V2bG+2gMir4fgt7ibhRM5QhKehFdMtRj7nH1PXR:7wqd87VR
Malware Config
Extracted
Family
gh0strat
C2
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/856-0-0x0000000010000000-0x000000001014F000-memory.dmp family_gh0strat -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 856 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1196 wrote to memory of 856 1196 rundll32.exe 86 PID 1196 wrote to memory of 856 1196 rundll32.exe 86 PID 1196 wrote to memory of 856 1196 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d164632c82b4e2f79405574bf0975e42878b33606c40f8528c3cdb6b5e9a9218.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d164632c82b4e2f79405574bf0975e42878b33606c40f8528c3cdb6b5e9a9218.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:856
-