Analysis
-
max time kernel
183s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 07:16
Static task
static1
Behavioral task
behavioral1
Sample
c96f4b79502c4a88af0ed0935a0d5f13.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c96f4b79502c4a88af0ed0935a0d5f13.dll
Resource
win10v2004-20220414-en
General
-
Target
c96f4b79502c4a88af0ed0935a0d5f13.dll
-
Size
126KB
-
MD5
c96f4b79502c4a88af0ed0935a0d5f13
-
SHA1
0976ef12d339a9ccd1d255d5d6f8d8f5198cd3a1
-
SHA256
1b53bf7d983101f59b0ea151b63eb925e5f703af4605388e90814c519225e22c
-
SHA512
8b5cff4daf9dd29e3c49ceec29cabc7a094e4d2c89fe18d589d73d0113575987bc7db0b1492d2862c275a4f04ecbdc64a694d9637c12b5d71b36d030dc735486
Malware Config
Signatures
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 4568 rundll32.exe 4568 rundll32.exe 4568 rundll32.exe 4568 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3592 wrote to memory of 4568 3592 rundll32.exe rundll32.exe PID 3592 wrote to memory of 4568 3592 rundll32.exe rundll32.exe PID 3592 wrote to memory of 4568 3592 rundll32.exe rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c96f4b79502c4a88af0ed0935a0d5f13.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c96f4b79502c4a88af0ed0935a0d5f13.dll,#12⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4568
-