Analysis
-
max time kernel
8s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d89aea9f518ca7f10c8953c8d96e0f3.dll
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d89aea9f518ca7f10c8953c8d96e0f3.dll
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0d89aea9f518ca7f10c8953c8d96e0f3.dll
-
Size
3.6MB
-
MD5
0d89aea9f518ca7f10c8953c8d96e0f3
-
SHA1
1a1833e2ddf136b6d87105765111e98566241da4
-
SHA256
0dfbfd5ffc2407580afee569af088ba1d0f5d44ac8fc4a4bb18b4481adf8a087
-
SHA512
c28e3afa4b2099089f323089ac9bba17390ee0f6ee5c04caccb6cdd0a5df0429aae71e1898733be14dfd5b54134289771b9a2794879e1c44dcf1631505616b69
-
SSDEEP
49152:wtiEM3qSat9+rZufjlxnyqxSgF8CP4rhDTF+2huh:wtT4ZurlL8CP4rh1+gu
Score
10/10
Malware Config
Signatures
-
UnicornStealer
UnicornStealer is a modular infostealer written in C++.
-
Unicorn Stealer payload 2 IoCs
resource yara_rule behavioral1/memory/2740-37-0x0000000016400000-0x0000000016545000-memory.dmp unicorn behavioral1/memory/2076-39-0x0000000000400000-0x0000000000532000-memory.dmp unicorn -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 792 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2844 wrote to memory of 792 2844 rundll32.exe 28 PID 2844 wrote to memory of 792 2844 rundll32.exe 28 PID 2844 wrote to memory of 792 2844 rundll32.exe 28 PID 2844 wrote to memory of 792 2844 rundll32.exe 28 PID 2844 wrote to memory of 792 2844 rundll32.exe 28 PID 2844 wrote to memory of 792 2844 rundll32.exe 28 PID 2844 wrote to memory of 792 2844 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d89aea9f518ca7f10c8953c8d96e0f3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d89aea9f518ca7f10c8953c8d96e0f3.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:792 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:2740
-
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\system32\dllhost.exe"4⤵PID:2076
-
-
-