Analysis
-
max time kernel
39s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 16:00
Static task
static1
Behavioral task
behavioral1
Sample
7cb8f2010007aeb58669ae9d07c3daf2236094811e465a297c36ad6e8b6437b3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cb8f2010007aeb58669ae9d07c3daf2236094811e465a297c36ad6e8b6437b3.dll
Resource
win10v2004-20220901-en
General
-
Target
7cb8f2010007aeb58669ae9d07c3daf2236094811e465a297c36ad6e8b6437b3.dll
-
Size
247KB
-
MD5
8ac218fb2468058800aff6680f9bad82
-
SHA1
e32cacb4576becffc229fc3d61da52151668368a
-
SHA256
7cb8f2010007aeb58669ae9d07c3daf2236094811e465a297c36ad6e8b6437b3
-
SHA512
5e2e722cf8cf0b7b342b2faf4b42535c1e01771928e15b74befbf7f8764eb561606783c4a5b9a57038cc7d244b2d433107254108728d4c83149dd36869f72587
-
SSDEEP
6144:Mse8rPLbShV71xut8g6MgddYULGt/5JNfG:jTPaj71xA89MSY5/53f
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 8 5080 rundll32.exe 12 5080 rundll32.exe 15 5080 rundll32.exe 18 5080 rundll32.exe 20 5080 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinNew = "rundll32 \"C:\\Users\\Admin\\AppData\\Local\\winexe.dll\",run" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3368 wrote to memory of 5080 3368 rundll32.exe 76 PID 3368 wrote to memory of 5080 3368 rundll32.exe 76 PID 3368 wrote to memory of 5080 3368 rundll32.exe 76
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7cb8f2010007aeb58669ae9d07c3daf2236094811e465a297c36ad6e8b6437b3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7cb8f2010007aeb58669ae9d07c3daf2236094811e465a297c36ad6e8b6437b3.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:5080
-