Analysis
-
max time kernel
90s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-05-2022 17:59
Static task
static1
Behavioral task
behavioral1
Sample
210d9d14509f0bc2c26c87ba5fef4108.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
210d9d14509f0bc2c26c87ba5fef4108.dll
Resource
win10v2004-20220414-en
General
-
Target
210d9d14509f0bc2c26c87ba5fef4108.dll
-
Size
126KB
-
MD5
210d9d14509f0bc2c26c87ba5fef4108
-
SHA1
8f4443a8cdfe1ff2156c3a1abd3371e778a2806f
-
SHA256
993c8664fac2e9aefc6cd25b3b435d6358fccc98119faedadbd68679281c0b77
-
SHA512
68250b674fff40870d5102760b9064e3483850f91d64a2fe395bea0058559b79daa5ad867d7578fe875d7ead415801eb99b49718912799e69683df66036c8095
Malware Config
Signatures
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rundll32.exepid process 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe 2272 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1496 wrote to memory of 2272 1496 rundll32.exe rundll32.exe PID 1496 wrote to memory of 2272 1496 rundll32.exe rundll32.exe PID 1496 wrote to memory of 2272 1496 rundll32.exe rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\210d9d14509f0bc2c26c87ba5fef4108.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\210d9d14509f0bc2c26c87ba5fef4108.dll,#12⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:2272
-