Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2023, 19:23

General

  • Target

    564e339c289550d9c954c5921bc5bd49dfad30b650f534b9bf1889071616da6a.dll

  • Size

    2.6MB

  • MD5

    3b7332075b3da4f8f293d7d172951f24

  • SHA1

    7977b5de16e5cd55628b2f43b6cac32c529cd33a

  • SHA256

    564e339c289550d9c954c5921bc5bd49dfad30b650f534b9bf1889071616da6a

  • SHA512

    3d6a02932d1b732ffd4014eb7f2a0fd7c1a27b1b8bc2722921ad382e9146be2c9da1f9486a95cd272975687c99345288fa2505daf7484fdf518e2dcecfebf790

  • SSDEEP

    49152:CCM+e/J/cF5+hPmoPUYvslHitRCcDVEpXhEQTZ1lsc07P4HgchLzxf3:Wh/C5s+WTvslHS7DA2Wz/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 58 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 62 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\564e339c289550d9c954c5921bc5bd49dfad30b650f534b9bf1889071616da6a.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5092
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\564e339c289550d9c954c5921bc5bd49dfad30b650f534b9bf1889071616da6a.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Users\Admin\AppData\Local\Temp\8C32.tmp
        C:\Users\Admin\AppData\Local\Temp\8C32.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:3440

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Google\CrashReports\5ff37661-fff5-47e1-a3a3-1dcf2159e415.dmp

          Filesize

          33KB

          MD5

          47225a984b328ef5b960fbf5c1447f12

          SHA1

          1be5732c48c2f7c859eaaba215dc5a92990af6fb

          SHA256

          bb1c9d854cf363cda357223529718837d9fafec3067468804392e06e918f6ca9

          SHA512

          80172677e222c527a0d3934f8b44ae56a4a6d227166b15669f3bcb889b20bea9fa9c52f2f40d8ab4ba1008f8f01a85f638235a285434168f3932ae3343619c01

        • C:\Users\Admin\AppData\Local\Temp\8C32.tmp

          Filesize

          145KB

          MD5

          c610e7ccd6859872c585b2a85d7dc992

          SHA1

          362b3d4b72e3add687c209c79b500b7c6a246d46

          SHA256

          14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

          SHA512

          8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

        • C:\Users\Admin\AppData\Local\Temp\8C32.tmp

          Filesize

          145KB

          MD5

          c610e7ccd6859872c585b2a85d7dc992

          SHA1

          362b3d4b72e3add687c209c79b500b7c6a246d46

          SHA256

          14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

          SHA512

          8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

        • memory/4028-0-0x0000000002930000-0x00000000029FC000-memory.dmp

          Filesize

          816KB

        • memory/4028-1-0x0000000002930000-0x00000000029FC000-memory.dmp

          Filesize

          816KB