Analysis
-
max time kernel
37s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 07:16
Static task
static1
Behavioral task
behavioral1
Sample
c96f4b79502c4a88af0ed0935a0d5f13.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c96f4b79502c4a88af0ed0935a0d5f13.dll
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
c96f4b79502c4a88af0ed0935a0d5f13.dll
-
Size
126KB
-
MD5
c96f4b79502c4a88af0ed0935a0d5f13
-
SHA1
0976ef12d339a9ccd1d255d5d6f8d8f5198cd3a1
-
SHA256
1b53bf7d983101f59b0ea151b63eb925e5f703af4605388e90814c519225e22c
-
SHA512
8b5cff4daf9dd29e3c49ceec29cabc7a094e4d2c89fe18d589d73d0113575987bc7db0b1492d2862c275a4f04ecbdc64a694d9637c12b5d71b36d030dc735486
Score
7/10
Malware Config
Signatures
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1604 rundll32.exe 1604 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1604 1672 rundll32.exe 16 PID 1672 wrote to memory of 1604 1672 rundll32.exe 16 PID 1672 wrote to memory of 1604 1672 rundll32.exe 16 PID 1672 wrote to memory of 1604 1672 rundll32.exe 16 PID 1672 wrote to memory of 1604 1672 rundll32.exe 16 PID 1672 wrote to memory of 1604 1672 rundll32.exe 16 PID 1672 wrote to memory of 1604 1672 rundll32.exe 16 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c96f4b79502c4a88af0ed0935a0d5f13.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c96f4b79502c4a88af0ed0935a0d5f13.dll,#12⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:1604
-