Analysis
-
max time kernel
186s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
9634c5efbda486f33066bddeec1d80ee2ce1f89c5e8ce55189da3c90986059d7.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9634c5efbda486f33066bddeec1d80ee2ce1f89c5e8ce55189da3c90986059d7.dll
Resource
win10v2004-20220812-en
General
-
Target
9634c5efbda486f33066bddeec1d80ee2ce1f89c5e8ce55189da3c90986059d7.dll
-
Size
4.7MB
-
MD5
737ab7aba216fc2abee9d4c3f9180a89
-
SHA1
b593cd2742f88d0f93023402b1f01199c7b553a8
-
SHA256
9634c5efbda486f33066bddeec1d80ee2ce1f89c5e8ce55189da3c90986059d7
-
SHA512
250bbd2149446e5d15b67525ecbc32fcc6a52d2a2279fb1895c16f5e4c9e8be5ec8c6bb0b721c4f6188a84b82528bd60baf3e7b494b086a9696ada638a624d8d
-
SSDEEP
49152:p+avudqS6vdIJH5m+A2O0RPLK7HHztGsFXEezqWmT6Td/GDlEzt:IkjoLKTFXEe+7E
Malware Config
Signatures
-
UnicornStealer
UnicornStealer is a modular infostealer written in C++.
-
Unicorn Stealer payload 3 IoCs
resource yara_rule behavioral1/memory/1532-62-0x00000000165B0000-0x00000000166E9000-memory.dmp unicorn behavioral1/memory/1628-74-0x0000000000400000-0x0000000000527000-memory.dmp unicorn behavioral1/memory/1628-75-0x0000000000400000-0x0000000000527000-memory.dmp unicorn -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 868 rundll32.exe 1532 dllhost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe 1628 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1532 dllhost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 868 rundll32.exe 1628 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 960 wrote to memory of 868 960 rundll32.exe 28 PID 960 wrote to memory of 868 960 rundll32.exe 28 PID 960 wrote to memory of 868 960 rundll32.exe 28 PID 960 wrote to memory of 868 960 rundll32.exe 28 PID 960 wrote to memory of 868 960 rundll32.exe 28 PID 960 wrote to memory of 868 960 rundll32.exe 28 PID 960 wrote to memory of 868 960 rundll32.exe 28 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 868 wrote to memory of 1532 868 rundll32.exe 29 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31 PID 1532 wrote to memory of 1628 1532 dllhost.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9634c5efbda486f33066bddeec1d80ee2ce1f89c5e8ce55189da3c90986059d7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9634c5efbda486f33066bddeec1d80ee2ce1f89c5e8ce55189da3c90986059d7.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1628
-
-
-