Analysis

  • max time kernel
    115s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 01:15

General

  • Target

    54f7f3b113bc233f32d95f6861ed9f716976512173ee958d0f349dac97e991ea.dll

  • Size

    2.6MB

  • MD5

    625c0ac260c3e91787ad57819a18f96b

  • SHA1

    f872b9e7b2fd940a10f7b87734c9e0098fdb0c52

  • SHA256

    54f7f3b113bc233f32d95f6861ed9f716976512173ee958d0f349dac97e991ea

  • SHA512

    43b43514f7026143999eaeccb9e4f8b8d66a6ea7c89f3498b0008f0a03fe688ad650bf3ce57a2abae73e6f254570a52a590ac1cd1a4f851bff1abcd8d406d8fa

  • SSDEEP

    49152:i3GRfLISK1RjB0+hi962F3fbClIeZaF5pXhEQTZ1lsc47vFn2Iwh2sUjfBjxZng:2+w1RjB0ia6Y3fbb6aFeFn2IDV7C

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 58 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 62 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\54f7f3b113bc233f32d95f6861ed9f716976512173ee958d0f349dac97e991ea.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\54f7f3b113bc233f32d95f6861ed9f716976512173ee958d0f349dac97e991ea.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4620
      • C:\Users\Admin\AppData\Local\Temp\39FC.tmp
        C:\Users\Admin\AppData\Local\Temp\39FC.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:3316

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Google\CrashReports\6fa2d3a0-7eef-4f1d-ba0c-c9a165f6f2a6.dmp

          Filesize

          34KB

          MD5

          716587de40cc7b8a180713798deb2ab5

          SHA1

          aca494b4d23f574cbcea4767996f5ff7ad6abe09

          SHA256

          5173bb3158e481252101181a1d2d091f0b49581461946e0736f95f307c1f31f9

          SHA512

          784798b3e75d415f796914554449eb52fefdc836a5edc347e87ebbfc6526598de7b9b008388861872dc7517e869e62c17b40caf3c1009fabd3c8757165396ff6

        • C:\Users\Admin\AppData\Local\Temp\39FC.tmp

          Filesize

          145KB

          MD5

          c610e7ccd6859872c585b2a85d7dc992

          SHA1

          362b3d4b72e3add687c209c79b500b7c6a246d46

          SHA256

          14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

          SHA512

          8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

        • memory/4620-0-0x0000000002C00000-0x0000000002CCC000-memory.dmp

          Filesize

          816KB

        • memory/4620-1-0x0000000002C00000-0x0000000002CCC000-memory.dmp

          Filesize

          816KB