Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
ce042a07d6f3907e468295e401968435e8d2315f3c913f215e4994e64cc0844f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce042a07d6f3907e468295e401968435e8d2315f3c913f215e4994e64cc0844f.dll
Resource
win10v2004-20220812-en
General
-
Target
ce042a07d6f3907e468295e401968435e8d2315f3c913f215e4994e64cc0844f.dll
-
Size
63KB
-
MD5
67f60fe2486fc92633e598a9af1a9b55
-
SHA1
c6fafdad7f47017440cd473d2c3edcbb29adcc3b
-
SHA256
ce042a07d6f3907e468295e401968435e8d2315f3c913f215e4994e64cc0844f
-
SHA512
792362a65388c568214ef9a02f54c25fc4f26869882bb6b1b1e995a36cd9399493dfaada8575c12897d613749bf2cb7ab2c175709681c6d71405aea672b414ad
-
SSDEEP
1536:aqcSpyjkghgeQc4dq6H3pZw59kpNRSm1OAyFGwLQBamGe:aqzXiQldqa3TqKXOAyFswm/
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1108 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 360 wrote to memory of 1108 360 rundll32.exe 27 PID 360 wrote to memory of 1108 360 rundll32.exe 27 PID 360 wrote to memory of 1108 360 rundll32.exe 27 PID 360 wrote to memory of 1108 360 rundll32.exe 27 PID 360 wrote to memory of 1108 360 rundll32.exe 27 PID 360 wrote to memory of 1108 360 rundll32.exe 27 PID 360 wrote to memory of 1108 360 rundll32.exe 27 PID 1108 wrote to memory of 1268 1108 rundll32.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce042a07d6f3907e468295e401968435e8d2315f3c913f215e4994e64cc0844f.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce042a07d6f3907e468295e401968435e8d2315f3c913f215e4994e64cc0844f.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1108
-
-