Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2023 20:55

General

  • Target

    82db9cdfd7735bf92dc4350192c4fd03fa679a8a582a7757da474457c9f21c51.dll

  • Size

    2.6MB

  • MD5

    86cba9b782bd2c54e91ccfae8992a44f

  • SHA1

    1700f139c9db6c7e28ae27a04e3b874afb4d3ffb

  • SHA256

    82db9cdfd7735bf92dc4350192c4fd03fa679a8a582a7757da474457c9f21c51

  • SHA512

    6f4a780d4ce840e33601274c002e2b4dab9914e87e0c65d9eb7364fb157a65e893c4867b90d25b5a7decb8cf021827d000e53500a2046502b5b5910617495171

  • SSDEEP

    49152:bMdjmDapohGQJ85O7DiU5sxOpEpRavzEpXhEQTZ1lsc07PeBlXzgVmTZQcR0:4xlw84qGsxj7a224vQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 20 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 62 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\82db9cdfd7735bf92dc4350192c4fd03fa679a8a582a7757da474457c9f21c51.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\82db9cdfd7735bf92dc4350192c4fd03fa679a8a582a7757da474457c9f21c51.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\Users\Admin\AppData\Local\Temp\9318.tmp
        C:\Users\Admin\AppData\Local\Temp\9318.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:4512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Google\CrashReports\4955da9b-536b-4bdc-91de-0a9b0ea17e40.dmp

    Filesize

    34KB

    MD5

    125039fa5f8b71a8088924507ed5a1aa

    SHA1

    26c4c595f815289c2f3b5c9b9fb66f4c7968e51a

    SHA256

    34d07d3d2a4c506f72ac95f64d6a3c264e7f91b1f2936127c95ab35c785fc5ce

    SHA512

    e817a2d8dfcf087c1179bc68113e96fc081723a7c043753676d717d84862eff79d84b6f57c0eaaa33415fe46b6b556277bbed3b9b9bdbc4b2456215ec4fdaf91

  • C:\Users\Admin\AppData\Local\Temp\9318.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • C:\Users\Admin\AppData\Local\Temp\9318.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • memory/3680-0-0x0000000002060000-0x0000000002128000-memory.dmp

    Filesize

    800KB

  • memory/3680-1-0x0000000002060000-0x0000000002128000-memory.dmp

    Filesize

    800KB