Analysis

  • max time kernel
    161s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 02:24

General

  • Target

    f6c35439768f45b8ecd387336e29233909b8f2d54b3bdb3997796d3ac8c67ec1.dll

  • Size

    2.6MB

  • MD5

    01ad292368c924b1cebb26e2c0faba27

  • SHA1

    4c96392cb59875cb4a78a1ffea15d4df0f90b2c0

  • SHA256

    f6c35439768f45b8ecd387336e29233909b8f2d54b3bdb3997796d3ac8c67ec1

  • SHA512

    813b48b4fc7b177e036a79bdbb69e5c8cd663d385be8d8451641147044bd9be03263bf48c4fd9cdec22a06b6131a80362ffc83c32ca9722a5d02eecb8c35074c

  • SSDEEP

    49152:y+vAmTdGxighVZ05zCKMAZDEcQPD680dH95pXhEQTZ1lsc47vGX7yysvZHMLYog:Hvr4jZ0Z/DEfT0HdeGX7+R

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f6c35439768f45b8ecd387336e29233909b8f2d54b3bdb3997796d3ac8c67ec1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3864
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f6c35439768f45b8ecd387336e29233909b8f2d54b3bdb3997796d3ac8c67ec1.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Users\Admin\AppData\Local\Temp\B6CD.tmp
        C:\Users\Admin\AppData\Local\Temp\B6CD.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:3376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Google\CrashReports\3821e82d-6a59-45d6-993d-4253ef1d1cc4.dmp

    Filesize

    33KB

    MD5

    77ccf965f8f15d64f8d194a8ff89f45a

    SHA1

    50399c3d8f24b621bf0979e60b1a5ba45a02ba1e

    SHA256

    27f09f9cefb208b50ed659398c70fc2feda00e064e5a5576b2b02ecf6d0e3203

    SHA512

    9ffe2b3257da6ac7e00dc710c62186173b378548e2b59c6cceb445a116c327099d94c70a90e2948783ef2f913be739dfcca54424a3dd093978c02b7010d07bf5

  • C:\Users\Admin\AppData\Local\Temp\B6CD.tmp

    Filesize

    145KB

    MD5

    c610e7ccd6859872c585b2a85d7dc992

    SHA1

    362b3d4b72e3add687c209c79b500b7c6a246d46

    SHA256

    14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

    SHA512

    8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

  • memory/1148-0-0x00000000020D0000-0x000000000219E000-memory.dmp

    Filesize

    824KB

  • memory/1148-1-0x00000000020D0000-0x000000000219E000-memory.dmp

    Filesize

    824KB