Analysis
-
max time kernel
36s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/10/2022, 06:52
Behavioral task
behavioral1
Sample
5bc88f591a70717d01fd9fc4298035a1.dll
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
5bc88f591a70717d01fd9fc4298035a1.dll
-
Size
2.7MB
-
MD5
5bc88f591a70717d01fd9fc4298035a1
-
SHA1
96456d291aa2fde9bb32e31b16bd1322b1eaa144
-
SHA256
c2636c52de125a030317c9afec0ad696bdab1b80cbc0dbbac15511b2a1f468c9
-
SHA512
4251ca0c923033d43a12deedf6030c5ed012da38cef380275e61ab7a994545842f9249c6fff4f3a3c1155e8a718eaf2aa3919a4cf39351de58ba6c6a9e0b6989
-
SSDEEP
49152:Jzl1rpbUrqvv0v2rQVt8nqwI7lOOYc42ek:P1Kqvv07noI7lOOYcM
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 1 788 rundll32.exe 3 788 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26 PID 1612 wrote to memory of 788 1612 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5bc88f591a70717d01fd9fc4298035a1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5bc88f591a70717d01fd9fc4298035a1.dll,#12⤵
- Blocklisted process makes network request
PID:788
-