Analysis

  • max time kernel
    79s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    06-11-2020 00:46

General

  • Target

    d162942cf9bbe1e62aed8bd959a526d1215d2bafec68d37dab8a6d056c8b3d2e.dll

  • Size

    571KB

  • MD5

    294f343637d89d297d59e11e29f006d9

  • SHA1

    214afe8093c2d6c79723847974368fe110ddbfc8

  • SHA256

    d162942cf9bbe1e62aed8bd959a526d1215d2bafec68d37dab8a6d056c8b3d2e

  • SHA512

    45eabb2245c0fa06e9eb0039d2b690dbfc32e8700ca6e3f4dc0daf44469085b2e45aa44260addbb383f6a4615eb8f72d377c26abf0682c0404de50bb7e348001

Score
8/10

Malware Config

Signatures

  • Blacklisted process makes network request 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d162942cf9bbe1e62aed8bd959a526d1215d2bafec68d37dab8a6d056c8b3d2e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d162942cf9bbe1e62aed8bd959a526d1215d2bafec68d37dab8a6d056c8b3d2e.dll,#1
      2⤵
      • Blacklisted process makes network request
      • Loads dropped DLL
      PID:3900
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 1980
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2504

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\LocalLow\sqlite3.dll
    MD5

    f964811b68f9f1487c2b41e1aef576ce

    SHA1

    b423959793f14b1416bc3b7051bed58a1034025f

    SHA256

    83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

    SHA512

    565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

  • memory/2504-15-0x00000000057A0000-0x00000000057A1000-memory.dmp
    Filesize

    4KB

  • memory/2504-2-0x0000000004C30000-0x0000000004C31000-memory.dmp
    Filesize

    4KB

  • memory/3900-8-0x0000000000000000-mapping.dmp
  • memory/3900-5-0x0000000000000000-mapping.dmp
  • memory/3900-6-0x0000000000000000-mapping.dmp
  • memory/3900-7-0x0000000000000000-mapping.dmp
  • memory/3900-4-0x0000000000000000-mapping.dmp
  • memory/3900-0-0x0000000000000000-mapping.dmp
  • memory/3900-10-0x0000000000000000-mapping.dmp
  • memory/3900-12-0x0000000000000000-mapping.dmp
  • memory/3900-11-0x0000000000000000-mapping.dmp
  • memory/3900-13-0x0000000000000000-mapping.dmp
  • memory/3900-9-0x0000000000000000-mapping.dmp
  • memory/3900-14-0x0000000000000000-mapping.dmp
  • memory/3900-3-0x0000000000000000-mapping.dmp