Analysis
-
max time kernel
133s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:38
Static task
static1
Behavioral task
behavioral1
Sample
Cita.pdf.dll
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
Cita.pdf.dll
-
Size
228KB
-
MD5
8b35142067b0407d7ecb0efed87c404b
-
SHA1
192a0ce1dc533fc242266500753799b139703aa0
-
SHA256
4404e2c94e985a381ad5bf708cb2b29f75f793ff405c9c486360fbb628e34eb2
-
SHA512
0050d975e6a6ac9197a935021761ecfa2967a1e71882ba3154d7caab150805e6eb7532eb554aa2b6be478be7fadc2974d21f441da87002c3b654cce69c854dca
-
SSDEEP
3072:ck7Bl5GB0wzgpBWwmCzOqXN7m1tMG5WYdpAPGRA4VXVJhJ8Pnl65KLzQ:ck7Bl5GuygywmCx7lA+PGrVXVLOf1M
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 1064 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1032 wrote to memory of 1064 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1064 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1064 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1064 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1064 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1064 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1064 1032 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Cita.pdf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Cita.pdf.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:1064