Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-06-2023 11:22
Behavioral task
behavioral1
Sample
02306199.dll
Resource
win7-20230220-en
4 signatures
150 seconds
General
-
Target
02306199.dll
-
Size
92KB
-
MD5
01767b0e766ccabb965bd88af49f733a
-
SHA1
3012e252559b75f7740469e5ec61377c89f56a40
-
SHA256
dc55c78b5ceb3c21ad4aa2af56c7a359ff5f3e08d9f6912da7b7cee62807c7cf
-
SHA512
7511d7b4a0671817ab624559407ffa8fae4d443b45436ffc43af5c5e8751c6c6b28d1c42ccdf96959427b25e5fc2dc6b7e191a9cbe874f69097f3ba6d1466357
-
SSDEEP
1536:fS0ZG4UMpzNFj5OKAWmlrYZRJmnPeUsgqzbLMsNOxBznt:fSAbAKAWmqYnPeUstzDMxBzn
Malware Config
Signatures
-
Blocklisted process makes network request 26 IoCs
flow pid Process 1 1272 rundll32.exe 2 1272 rundll32.exe 3 1272 rundll32.exe 4 1272 rundll32.exe 5 1272 rundll32.exe 6 1272 rundll32.exe 8 1272 rundll32.exe 9 1272 rundll32.exe 10 1272 rundll32.exe 11 1272 rundll32.exe 12 1272 rundll32.exe 13 1272 rundll32.exe 14 1272 rundll32.exe 15 1272 rundll32.exe 16 1272 rundll32.exe 17 1272 rundll32.exe 18 1272 rundll32.exe 19 1272 rundll32.exe 20 1272 rundll32.exe 21 1272 rundll32.exe 22 1272 rundll32.exe 23 1272 rundll32.exe 24 1272 rundll32.exe 25 1272 rundll32.exe 26 1272 rundll32.exe 27 1272 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1272 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1272 1204 rundll32.exe 28 PID 1204 wrote to memory of 1272 1204 rundll32.exe 28 PID 1204 wrote to memory of 1272 1204 rundll32.exe 28 PID 1204 wrote to memory of 1272 1204 rundll32.exe 28 PID 1204 wrote to memory of 1272 1204 rundll32.exe 28 PID 1204 wrote to memory of 1272 1204 rundll32.exe 28 PID 1204 wrote to memory of 1272 1204 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02306199.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02306199.dll,#12⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:1272
-