Analysis

  • max time kernel
    107s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 09:16

General

  • Target

    89ab19f18cbc4be6a719ba3141c335556879409389163b0f8e4b25f766576478.dll

  • Size

    2.6MB

  • MD5

    0aa82ab81b74d8a30c3e8b279d3a3f4b

  • SHA1

    4cdb4a227c7ca8664f394da0a43be54d1c6caf38

  • SHA256

    89ab19f18cbc4be6a719ba3141c335556879409389163b0f8e4b25f766576478

  • SHA512

    6c30c36cf7a6b2bd78b5c5b93f1700f9ca9bb986de6e27aecc8f1178d663e873d6f7c35c0c24696601cc0d9f85b26e76f64ac22747b0f53dba2a0865ce497e5d

  • SSDEEP

    49152:4gbOY8k5vmIoSTNcZJEevSlYfBznlaK3aEpXhEQTZ1lsc07PhAPk2ltBMCfyWySd:jbvfoKK7yYfBBN392hAPzNNx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 58 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 62 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\89ab19f18cbc4be6a719ba3141c335556879409389163b0f8e4b25f766576478.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\89ab19f18cbc4be6a719ba3141c335556879409389163b0f8e4b25f766576478.dll,#1
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4324
      • C:\Users\Admin\AppData\Local\Temp\41FA.tmp
        C:\Users\Admin\AppData\Local\Temp\41FA.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:3644

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Google\CrashReports\59b5d553-9658-4b1a-8179-3c1c5f4b02cf.dmp

          Filesize

          30KB

          MD5

          a123c57abd570ae6f75f4efdf7f75fa3

          SHA1

          0117f1003e40c7d3030550d5d6285eade93c1af3

          SHA256

          2092f48a1649b9d00916d3f61f052ae20e8c620528f5efedecd200ee3e7b8693

          SHA512

          1599c5690f38d5da6d0be760192ba14c6abcb37c59298a9cdff7b5dbf6b83c7156c5887b13c0ad26d7bd19810a2639ee4368a8efe11d7e4ee6c9c9a0460a4428

        • C:\Users\Admin\AppData\Local\Temp\41FA.tmp

          Filesize

          145KB

          MD5

          c610e7ccd6859872c585b2a85d7dc992

          SHA1

          362b3d4b72e3add687c209c79b500b7c6a246d46

          SHA256

          14063fc61dc71b9881d75e93a587c27a6daf8779ff5255a24a042beace541041

          SHA512

          8570aad2ae8b5dcba00fc5ebf3dc0ea117e96cc88a83febd820c5811bf617a6431c1367b3eb88332f43f80b30ebe2c298c22dcc44860a075f7b41bf350236666

        • memory/4324-0-0x0000000000700000-0x00000000007C9000-memory.dmp

          Filesize

          804KB

        • memory/4324-1-0x0000000000700000-0x00000000007C9000-memory.dmp

          Filesize

          804KB