Analysis
-
max time kernel
52s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
01-12-2022 16:25
Behavioral task
behavioral1
Sample
104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62.dll
Resource
win10-20220901-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62.dll
-
Size
126KB
-
MD5
aebf8cd9ea982decded5ee6f3777c6d7
-
SHA1
406e723158cd5697503d1d04839d3bc7a5051603
-
SHA256
104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62
-
SHA512
f28fbb9b155348a6aca1105abf6f88640bb68374c07e023a7c9e06577006002d09b53b7629923c2486d7e9811f7254a296d19e566940077431e5089b06a13981
-
SSDEEP
3072:ox7pOYzBekuOmWDWCMq6As523HeS9FAiZ87vO2rlL3Rn+9:ox7ZNhH/dMq6AO0a7vVlT
Score
7/10
Malware Config
Signatures
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4848 4556 WerFault.exe 66 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4760 wrote to memory of 4556 4760 rundll32.exe 66 PID 4760 wrote to memory of 4556 4760 rundll32.exe 66 PID 4760 wrote to memory of 4556 4760 rundll32.exe 66 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\104af593683398f0980f2c86e6513b8c1b7dededc1f924d4693ad92410d51a62.dll,#12⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:4556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 7443⤵
- Program crash
PID:4848
-
-