Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
ee56fc84659c804ab0cc87c727b18ffb581a3c9ab0f8e0123c94068b8125fbcaN.dll
Resource
win7-20240903-en
General
-
Target
ee56fc84659c804ab0cc87c727b18ffb581a3c9ab0f8e0123c94068b8125fbcaN.dll
-
Size
6.5MB
-
MD5
e3113968a149ffafeae402a2536df0e0
-
SHA1
d53059ac710c83ced4b2c122ee2933fe1a3d7f6c
-
SHA256
ee56fc84659c804ab0cc87c727b18ffb581a3c9ab0f8e0123c94068b8125fbca
-
SHA512
e2d801edc0b200059c3eeaf5aa40b3cfdd3dced6055498e4a40586858da1a8a4bc40bf47ea453766ecf633c8e14205d786244b65f10ce20f09d4f92c0d670de2
-
SSDEEP
196608:Uh/4EnDrAzLz3n1XiiT0F8NxRLqQULvgTAudax:Uh/D/ArJqul/KvniI
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1312 2408 rundll32.exe 30 PID 2408 wrote to memory of 1312 2408 rundll32.exe 30 PID 2408 wrote to memory of 1312 2408 rundll32.exe 30 PID 2408 wrote to memory of 1312 2408 rundll32.exe 30 PID 2408 wrote to memory of 1312 2408 rundll32.exe 30 PID 2408 wrote to memory of 1312 2408 rundll32.exe 30 PID 2408 wrote to memory of 1312 2408 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee56fc84659c804ab0cc87c727b18ffb581a3c9ab0f8e0123c94068b8125fbcaN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee56fc84659c804ab0cc87c727b18ffb581a3c9ab0f8e0123c94068b8125fbcaN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1312
-