Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 19:59
Behavioral task
behavioral1
Sample
dc55c78b5ceb3c21ad4aa2af56c7a359ff5f3e08d9f6912da7b7cee62807c7cf.bin.sample.dll
Resource
win7-20230220-en
4 signatures
150 seconds
General
-
Target
dc55c78b5ceb3c21ad4aa2af56c7a359ff5f3e08d9f6912da7b7cee62807c7cf.bin.sample.dll
-
Size
92KB
-
MD5
01767b0e766ccabb965bd88af49f733a
-
SHA1
3012e252559b75f7740469e5ec61377c89f56a40
-
SHA256
dc55c78b5ceb3c21ad4aa2af56c7a359ff5f3e08d9f6912da7b7cee62807c7cf
-
SHA512
7511d7b4a0671817ab624559407ffa8fae4d443b45436ffc43af5c5e8751c6c6b28d1c42ccdf96959427b25e5fc2dc6b7e191a9cbe874f69097f3ba6d1466357
-
SSDEEP
1536:fS0ZG4UMpzNFj5OKAWmlrYZRJmnPeUsgqzbLMsNOxBznt:fSAbAKAWmqYnPeUstzDMxBzn
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 1 2040 rundll32.exe 3 2040 rundll32.exe 4 2040 rundll32.exe 5 2040 rundll32.exe 6 2040 rundll32.exe 7 2040 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2040 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2040 1084 rundll32.exe 26 PID 1084 wrote to memory of 2040 1084 rundll32.exe 26 PID 1084 wrote to memory of 2040 1084 rundll32.exe 26 PID 1084 wrote to memory of 2040 1084 rundll32.exe 26 PID 1084 wrote to memory of 2040 1084 rundll32.exe 26 PID 1084 wrote to memory of 2040 1084 rundll32.exe 26 PID 1084 wrote to memory of 2040 1084 rundll32.exe 26
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc55c78b5ceb3c21ad4aa2af56c7a359ff5f3e08d9f6912da7b7cee62807c7cf.bin.sample.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc55c78b5ceb3c21ad4aa2af56c7a359ff5f3e08d9f6912da7b7cee62807c7cf.bin.sample.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2040
-