Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 04:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6139eda5319de501e38e2f1c6e483434.dll
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
6139eda5319de501e38e2f1c6e483434.dll
Resource
win10v2004-20231222-en
7 signatures
150 seconds
General
-
Target
6139eda5319de501e38e2f1c6e483434.dll
-
Size
1.7MB
-
MD5
6139eda5319de501e38e2f1c6e483434
-
SHA1
d6976183951b9b4fa8b1f9f7e9da4e04d6e73bee
-
SHA256
44ce18b515dc6676006582f1fce1d9e5ab189187539f055b2b416912223c1241
-
SHA512
0732cd1be15bb0fb6f59bd2097e4ca17aac87b26fd90c2e32ee770678727aee34c94afc7009bf7d2ff40005ffccca6a2cee7a06aa079a9ee4f4333622dfc7a23
-
SSDEEP
24576:i4pLEZif00JxEAXqCvRAQKNDmWEAeApxOGlEZ4h0pZB5v31rIyOlIM+SSZPU:iGYZifFEAXr6fEaYp3Oy3Sc8
Score
10/10
Malware Config
Signatures
-
UnicornStealer
UnicornStealer is a modular infostealer written in C++.
-
Unicorn Stealer payload 17 IoCs
resource yara_rule behavioral2/memory/5004-10-0x0000000004C30000-0x0000000004D80000-memory.dmp unicorn behavioral2/memory/1812-12-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-13-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-17-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-19-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-20-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-22-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-25-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-27-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-26-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-28-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-30-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-31-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-39-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-55-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-57-0x0000000000400000-0x000000000053C000-memory.dmp unicorn behavioral2/memory/1812-58-0x0000000000400000-0x000000000053C000-memory.dmp unicorn -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2428 rundll32.exe 5004 svchost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe 1812 dllhost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5004 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1812 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2428 2304 rundll32.exe 18 PID 2304 wrote to memory of 2428 2304 rundll32.exe 18 PID 2304 wrote to memory of 2428 2304 rundll32.exe 18 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92 PID 2428 wrote to memory of 5004 2428 rundll32.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6139eda5319de501e38e2f1c6e483434.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6139eda5319de501e38e2f1c6e483434.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5004 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1812
-
-
-