Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
21-12-2022 15:45
Behavioral task
behavioral1
Sample
78edd4d43c88a72fb597719e580a54f566eb146d0b4ce9fc660063971c90adcf.dll
Resource
win10-20220812-en
windows10-1703-x64
6 signatures
150 seconds
General
-
Target
78edd4d43c88a72fb597719e580a54f566eb146d0b4ce9fc660063971c90adcf.dll
-
Size
126KB
-
MD5
bfee01170eb2d9a9d881a27d3c590b21
-
SHA1
1fce13219189f12350427570cf3f00eced380978
-
SHA256
78edd4d43c88a72fb597719e580a54f566eb146d0b4ce9fc660063971c90adcf
-
SHA512
123bbf0f8d8c9b8d98e44f2a38041afb3cbba68d24564976a39a9143c85fe988b4645dd092957060f6498a399210a808edebd7d35a85495927ea4b0bb5f1883a
-
SSDEEP
3072:4x7pOYzBekPjs1QQYe4vHWSFlIjQqfOXEMaLXbWSTG9:4x7ZNhPjyYefBfOXDaTp
Score
7/10
Malware Config
Signatures
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1484 5004 WerFault.exe 67 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5004 rundll32.exe 5004 rundll32.exe 5004 rundll32.exe 5004 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3824 wrote to memory of 5004 3824 rundll32.exe 67 PID 3824 wrote to memory of 5004 3824 rundll32.exe 67 PID 3824 wrote to memory of 5004 3824 rundll32.exe 67 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\78edd4d43c88a72fb597719e580a54f566eb146d0b4ce9fc660063971c90adcf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\78edd4d43c88a72fb597719e580a54f566eb146d0b4ce9fc660063971c90adcf.dll,#12⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:5004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 7683⤵
- Program crash
PID:1484
-
-