Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2024, 22:20

General

  • Target

    0e8690402b8e345f291a375faabbb4cff18211530b2cbcf4a3f8701af7e3f07d.dll

  • Size

    2.7MB

  • MD5

    1022f85597105046e36e6b4639611126

  • SHA1

    3c83b52128577ad42500c09ac5e016c715d87353

  • SHA256

    0e8690402b8e345f291a375faabbb4cff18211530b2cbcf4a3f8701af7e3f07d

  • SHA512

    3484e00c33bce040c85d71b970aa3074b2c655d0bfce370b8b91f06005c1ff74e21b70baf12b009b7cae4f20436a3c0535fb892338c9f44bfe4ac074c284356e

  • SSDEEP

    49152:WOHo9DJr9jFrWO5WaISn+6mZE5OnEEzjSjhTSGIo8Y70trkjQGxph2PpccEd9j2:WOHoxkqIq+F7EEzm2tr2QGPh2Ppr4j

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 58 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0e8690402b8e345f291a375faabbb4cff18211530b2cbcf4a3f8701af7e3f07d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0e8690402b8e345f291a375faabbb4cff18211530b2cbcf4a3f8701af7e3f07d.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Users\Admin\AppData\Local\Temp\3E61.tmp
        C:\Users\Admin\AppData\Local\Temp\3E61.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:4108

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Google\CrashReports\01200dfa-c651-4875-a8f8-c4c01d402500.dmp

          Filesize

          34KB

          MD5

          d3c651ca899414b7f0c53d5e4c6a5493

          SHA1

          78f9dc17c1539dc01c7d90ef50f019ecfbece722

          SHA256

          1b383d0e7fb431c853c4f7ec113b2b4ef16bd27857c785a26eb4315ecb3bf37a

          SHA512

          d1ac5b38629a9a72effe0b0cb92c78607d54552edbd0539e52c850f23fc93d5fb3c0952e2ebb76e3cd84a14354c7c378fd23157bd5d90dd415954a3ec2dac2ae

        • C:\Users\Admin\AppData\Local\Temp\3E61.tmp

          Filesize

          145KB

          MD5

          c610e7ccd6859872c585b2a85d7dc992

          SHA1

          362b3d4b72e3add687c209c79b500b7c6a246d46

          SHA256

          14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

          SHA512

          8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

        • memory/1360-0-0x0000000002720000-0x00000000027ED000-memory.dmp

          Filesize

          820KB

        • memory/1360-1-0x0000000002720000-0x00000000027ED000-memory.dmp

          Filesize

          820KB

        • memory/1360-4-0x0000000018000000-0x00000000182AF000-memory.dmp

          Filesize

          2.7MB

        • memory/1360-13-0x0000000018000000-0x00000000182AF000-memory.dmp

          Filesize

          2.7MB