Analysis
-
max time kernel
43s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-09-2022 09:54
Static task
static1
Behavioral task
behavioral1
Sample
1889e4152e16cfe78a18739fed6fb08a.dll
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
1889e4152e16cfe78a18739fed6fb08a.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
16 signatures
150 seconds
General
-
Target
1889e4152e16cfe78a18739fed6fb08a.dll
-
Size
2.7MB
-
MD5
1889e4152e16cfe78a18739fed6fb08a
-
SHA1
5e6f4589a3006a311e02ade1384b9898f490b597
-
SHA256
6983444f08941c47b17a1c0f23431f538340e0febaa5858a4afed5bb75650908
-
SHA512
89339007911e01c6d7f24737efa92fc61d1287a31dcee2e802d381c2a9981375212b19bcc270a39a3872b1b4983eb07a4caa4cbf9fa7f6822408263346e83488
-
SSDEEP
49152:UnwY5UQC3ad5/iojZIphmzJAwSXX6cIOjYzxlOwtqo:yj9JAwyqKjYzxlOwz
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 3 964 rundll32.exe 6 964 rundll32.exe 15 964 rundll32.exe 19 964 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 964 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26 PID 1184 wrote to memory of 964 1184 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1889e4152e16cfe78a18739fed6fb08a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1889e4152e16cfe78a18739fed6fb08a.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:964
-