Analysis

  • max time kernel
    152s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2023, 19:55

General

  • Target

    18926c1426d47bca83eb47549f75d71c0ad77977639a0e286d1f5c3691ba8752.dll

  • Size

    2.6MB

  • MD5

    a2edc44fa74aa6208f5fe9cfd1f28189

  • SHA1

    d45718489f90a8fbbd6edf4f03328cbe8836bf77

  • SHA256

    18926c1426d47bca83eb47549f75d71c0ad77977639a0e286d1f5c3691ba8752

  • SHA512

    fc33a353184b457169f78d1725caa88682764b9c7f40b75da52b12e8372e5a9e96325b3c4ba5e725b40df76975d86ae29548c16ae273eae08724f910acadc6cf

  • SSDEEP

    49152:FuHxatv9FfWhAGncBhulSF1chAjSjhTSGIo8Y70sG024bW+kToNc:FuHK7dBhLQhAm2s0yW9wc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 62 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\18926c1426d47bca83eb47549f75d71c0ad77977639a0e286d1f5c3691ba8752.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3708
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\18926c1426d47bca83eb47549f75d71c0ad77977639a0e286d1f5c3691ba8752.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4636
      • C:\Users\Admin\AppData\Local\Temp\7F80.tmp
        C:\Users\Admin\AppData\Local\Temp\7F80.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:2280

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Google\CrashReports\9f4bebbb-b203-48b8-b6a3-e30ce2ca53eb.dmp

          Filesize

          35KB

          MD5

          e213277991f43ed25dcd87aad9d25800

          SHA1

          f2804f29ccf1b228ba6cf4cecc3b4ed4fad8f595

          SHA256

          f8c08c88346fa9debf067f515f8a03615b4247d8bb4efc53a3f318cc912553ae

          SHA512

          cc41746b739ad5625e19c55e2ec2c90dd1ad1c308737c2cdd85ab2a17cec756afcdf60170dee9b81aa168f7110dd1c85ae9d5196924400c10c76805dbe1214bf

        • C:\Users\Admin\AppData\Local\Temp\7F80.tmp

          Filesize

          145KB

          MD5

          c610e7ccd6859872c585b2a85d7dc992

          SHA1

          362b3d4b72e3add687c209c79b500b7c6a246d46

          SHA256

          14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

          SHA512

          8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

        • C:\Users\Admin\AppData\Local\Temp\7F80.tmp

          Filesize

          145KB

          MD5

          c610e7ccd6859872c585b2a85d7dc992

          SHA1

          362b3d4b72e3add687c209c79b500b7c6a246d46

          SHA256

          14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

          SHA512

          8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

        • memory/4636-0-0x0000000000B50000-0x0000000000C18000-memory.dmp

          Filesize

          800KB

        • memory/4636-1-0x0000000000B50000-0x0000000000C18000-memory.dmp

          Filesize

          800KB

        • memory/4636-2-0x0000000018000000-0x00000000182AA000-memory.dmp

          Filesize

          2.7MB

        • memory/4636-11-0x0000000018000000-0x00000000182AA000-memory.dmp

          Filesize

          2.7MB