Analysis
-
max time kernel
20s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 09:50
Static task
static1
Behavioral task
behavioral1
Sample
a79df094b8c318c69d1ba4a9a3916e23f807c5fcd190c4ebefb7615f49b1dfc5.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a79df094b8c318c69d1ba4a9a3916e23f807c5fcd190c4ebefb7615f49b1dfc5.dll
Resource
win10v2004-20220812-en
General
-
Target
a79df094b8c318c69d1ba4a9a3916e23f807c5fcd190c4ebefb7615f49b1dfc5.dll
-
Size
51KB
-
MD5
cde51a17eb7acab99395803c65cece7f
-
SHA1
fa28e850fe4f04aa11f9df4132c4bdd1609d8114
-
SHA256
a79df094b8c318c69d1ba4a9a3916e23f807c5fcd190c4ebefb7615f49b1dfc5
-
SHA512
e49fb5604355aae3d7ffa242fa8997eb5ef2bae44f758b6f979895067095cd7147c34bedb25367da6e549efd609fd09d0b65689fa51c60165099410073ace73d
-
SSDEEP
1536:6TpBP+ZTM8xRgLPjWg90BL/mkJ8BOpIBHu/gcin9:6Ty68xRqPjWLL+kCLR0gci
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1948 rundll32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1948 1960 rundll32.exe 28 PID 1960 wrote to memory of 1948 1960 rundll32.exe 28 PID 1960 wrote to memory of 1948 1960 rundll32.exe 28 PID 1960 wrote to memory of 1948 1960 rundll32.exe 28 PID 1960 wrote to memory of 1948 1960 rundll32.exe 28 PID 1960 wrote to memory of 1948 1960 rundll32.exe 28 PID 1960 wrote to memory of 1948 1960 rundll32.exe 28 PID 1948 wrote to memory of 1220 1948 rundll32.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a79df094b8c318c69d1ba4a9a3916e23f807c5fcd190c4ebefb7615f49b1dfc5.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a79df094b8c318c69d1ba4a9a3916e23f807c5fcd190c4ebefb7615f49b1dfc5.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948
-
-