Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/09/2023, 20:57

General

  • Target

    0228d1b9fe5169108c7555dc0c80dd9e9f0a1427ac0d2289a6a5e6c2ab02c009.dll

  • Size

    2.6MB

  • MD5

    ee6de6511b0eb1c3941da56db0b279f1

  • SHA1

    a8d01ea205bc27c064f1c0773dedf7b50f0a3a30

  • SHA256

    0228d1b9fe5169108c7555dc0c80dd9e9f0a1427ac0d2289a6a5e6c2ab02c009

  • SHA512

    1f833a3f2e063a25b90d9dcede9890cabd9d59380eb56175fe624a1a0c2b31c9d37eb8775feb0caad11cecdbb8d1e9172dad88ab6dbda26acc9f266d769b6d78

  • SSDEEP

    49152:Dtpxthy0CkWFTf/f5JcH8Hbjr1lLL9q/EpXhEQTZ1lsc07P9KoLHZovMmC3DJeMO:xbm/zTvY8HbjfBqq29KoLHOkmwNO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 58 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 62 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0228d1b9fe5169108c7555dc0c80dd9e9f0a1427ac0d2289a6a5e6c2ab02c009.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0228d1b9fe5169108c7555dc0c80dd9e9f0a1427ac0d2289a6a5e6c2ab02c009.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:452
      • C:\Users\Admin\AppData\Local\Temp\8C32.tmp
        C:\Users\Admin\AppData\Local\Temp\8C32.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:1088

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Google\CrashReports\e63d3e6f-ccde-4205-8492-de479852f366.dmp

          Filesize

          35KB

          MD5

          874aefe8252a3581f403b3fe86982eb1

          SHA1

          531268843f1e40fb8ec49ee44cdf604b513ef809

          SHA256

          1f6d34a2e586041cb0684d25e0fd86b0ba2152ac27cb886369438fbd986c22ea

          SHA512

          c0d87094695278024bfe0861a62209c75ab04c9d9c641e838f42aab851e1414a0b594fa97985869fb633191bacb6cca1b3fe2763d1ca4e82d05f6c3da1f5e339

        • C:\Users\Admin\AppData\Local\Temp\8C32.tmp

          Filesize

          145KB

          MD5

          c610e7ccd6859872c585b2a85d7dc992

          SHA1

          362b3d4b72e3add687c209c79b500b7c6a246d46

          SHA256

          14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

          SHA512

          8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

        • C:\Users\Admin\AppData\Local\Temp\8C32.tmp

          Filesize

          145KB

          MD5

          c610e7ccd6859872c585b2a85d7dc992

          SHA1

          362b3d4b72e3add687c209c79b500b7c6a246d46

          SHA256

          14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

          SHA512

          8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

        • memory/452-0-0x0000000000AE0000-0x0000000000BAA000-memory.dmp

          Filesize

          808KB

        • memory/452-1-0x0000000000AE0000-0x0000000000BAA000-memory.dmp

          Filesize

          808KB