Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-06-2023 07:51
Behavioral task
behavioral1
Sample
dc55c78b5ceb3c21ad4aa2af56c7a359ff5f3e08d9f6912da7b7cee62807c7cf.dll
Resource
win7-20230220-en
windows7-x64
4 signatures
150 seconds
General
-
Target
dc55c78b5ceb3c21ad4aa2af56c7a359ff5f3e08d9f6912da7b7cee62807c7cf.dll
-
Size
92KB
-
MD5
01767b0e766ccabb965bd88af49f733a
-
SHA1
3012e252559b75f7740469e5ec61377c89f56a40
-
SHA256
dc55c78b5ceb3c21ad4aa2af56c7a359ff5f3e08d9f6912da7b7cee62807c7cf
-
SHA512
7511d7b4a0671817ab624559407ffa8fae4d443b45436ffc43af5c5e8751c6c6b28d1c42ccdf96959427b25e5fc2dc6b7e191a9cbe874f69097f3ba6d1466357
-
SSDEEP
1536:fS0ZG4UMpzNFj5OKAWmlrYZRJmnPeUsgqzbLMsNOxBznt:fSAbAKAWmqYnPeUstzDMxBzn
Malware Config
Signatures
-
Blocklisted process makes network request 22 IoCs
flow pid Process 1 1324 rundll32.exe 2 1324 rundll32.exe 6 1324 rundll32.exe 7 1324 rundll32.exe 8 1324 rundll32.exe 9 1324 rundll32.exe 10 1324 rundll32.exe 11 1324 rundll32.exe 12 1324 rundll32.exe 13 1324 rundll32.exe 14 1324 rundll32.exe 15 1324 rundll32.exe 16 1324 rundll32.exe 17 1324 rundll32.exe 18 1324 rundll32.exe 19 1324 rundll32.exe 20 1324 rundll32.exe 21 1324 rundll32.exe 22 1324 rundll32.exe 23 1324 rundll32.exe 24 1324 rundll32.exe 25 1324 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1324 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1324 1344 rundll32.exe 27 PID 1344 wrote to memory of 1324 1344 rundll32.exe 27 PID 1344 wrote to memory of 1324 1344 rundll32.exe 27 PID 1344 wrote to memory of 1324 1344 rundll32.exe 27 PID 1344 wrote to memory of 1324 1344 rundll32.exe 27 PID 1344 wrote to memory of 1324 1344 rundll32.exe 27 PID 1344 wrote to memory of 1324 1344 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc55c78b5ceb3c21ad4aa2af56c7a359ff5f3e08d9f6912da7b7cee62807c7cf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc55c78b5ceb3c21ad4aa2af56c7a359ff5f3e08d9f6912da7b7cee62807c7cf.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1324
-