Analysis
-
max time kernel
30s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-03-2023 12:40
Static task
static1
Behavioral task
behavioral1
Sample
5636145ced6e73f725835d37f75395017a69a860236a01195dc4b11bdc2be021.dll
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
5636145ced6e73f725835d37f75395017a69a860236a01195dc4b11bdc2be021.dll
-
Size
1.0MB
-
MD5
2cf7028f2e221b5c48ce27381282d7ae
-
SHA1
b24556b48cc4cf9641448d87d9c1ee7f9af86c5a
-
SHA256
5636145ced6e73f725835d37f75395017a69a860236a01195dc4b11bdc2be021
-
SHA512
84772a961ab244bedc49bcf6825971a24969fbe3a45f0f6e3d26aaba8db400368637f3d80270a117891dc6df127e3f75763079aa8635ff47bbc24fe67ea22bb3
-
SSDEEP
24576:JMq/RX0hoa8wrC+azFbtZhUYFauTZyRMlH:Jioa8wrCHz3ZhUYRAuH
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1696 1148 WerFault.exe 11 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1696 1148 rundll32.exe 27 PID 1148 wrote to memory of 1696 1148 rundll32.exe 27 PID 1148 wrote to memory of 1696 1148 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5636145ced6e73f725835d37f75395017a69a860236a01195dc4b11bdc2be021.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1148 -s 3202⤵
- Program crash
PID:1696
-