Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/06/2023, 07:48 UTC

General

  • Target

    09951599.dll

  • Size

    92KB

  • MD5

    247101673bf2290c2dbb8bd68b20eaab

  • SHA1

    2c3d36aad7568abbfb024f96262b17750e7982c6

  • SHA256

    c33f729632291165c7d67f7de4174472f43623df95d2ec4c522470b9515927bd

  • SHA512

    332d7463118b21d2c81c939447eab9be120752823ca0b067484cebad3dcb6ff0b52a2d4e5bf8317383144692b0c30521f86a1d703c7b875307e548fe19d7ae9b

  • SSDEEP

    1536:0S0ZG4UMpzNFj5OKAWmlrYZRJmnPeUsgqzbLMsNOxBznt:0SAbAKAWmqYnPeUstzDMxBzn

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 29 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\09951599.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\09951599.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      PID:3388

Network

  • flag-us
    DNS
    210.80.52.64.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    210.80.52.64.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    44.8.109.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    44.8.109.52.in-addr.arpa
    IN PTR
    Response
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 13.89.179.9:443
    322 B
    7
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 192.229.221.95:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 209.197.3.8:80
    322 B
    7
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 96.16.110.41:443
    322 B
    7
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 209.197.3.8:80
    322 B
    7
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    264 B
    467 B
    5
    4
  • 64.52.80.210:443
    https
    rundll32.exe
    172 B
    52 B
    3
    1
  • 8.8.8.8:53
    210.80.52.64.in-addr.arpa
    dns
    71 B
    126 B
    1
    1

    DNS Request

    210.80.52.64.in-addr.arpa

  • 8.8.8.8:53
    44.8.109.52.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    44.8.109.52.in-addr.arpa

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.