Analysis

  • max time kernel
    37s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-05-2022 07:16

General

  • Target

    c96f4b79502c4a88af0ed0935a0d5f13.dll

  • Size

    126KB

  • MD5

    c96f4b79502c4a88af0ed0935a0d5f13

  • SHA1

    0976ef12d339a9ccd1d255d5d6f8d8f5198cd3a1

  • SHA256

    1b53bf7d983101f59b0ea151b63eb925e5f703af4605388e90814c519225e22c

  • SHA512

    8b5cff4daf9dd29e3c49ceec29cabc7a094e4d2c89fe18d589d73d0113575987bc7db0b1492d2862c275a4f04ecbdc64a694d9637c12b5d71b36d030dc735486

Malware Config

Signatures

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c96f4b79502c4a88af0ed0935a0d5f13.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c96f4b79502c4a88af0ed0935a0d5f13.dll,#1
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • outlook_win_path
      PID:1604

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1604-54-0x0000000000000000-mapping.dmp

  • memory/1604-55-0x0000000075371000-0x0000000075373000-memory.dmp

    Filesize

    8KB

  • memory/1604-56-0x0000000000161000-0x000000000017B000-memory.dmp

    Filesize

    104KB