Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 04:24
Static task
static1
Behavioral task
behavioral1
Sample
c84678de8bb2f508e61f66f67c4942850d3e5a69f669e352c2a0c635dbfaa7eeN.dll
Resource
win7-20240903-en
General
-
Target
c84678de8bb2f508e61f66f67c4942850d3e5a69f669e352c2a0c635dbfaa7eeN.dll
-
Size
6.4MB
-
MD5
66e1a2eaff7514c29b83b8f52281d550
-
SHA1
371835e2a79f3003e7bae586bb5c02c2b66bea69
-
SHA256
c84678de8bb2f508e61f66f67c4942850d3e5a69f669e352c2a0c635dbfaa7ee
-
SHA512
f9bc915d249ce56acef45836408a7f42978d5625354f491a66b8ad0b310a115e5a8ebb4fa8b9f2eecc0ea5c873322489db400d3287dde0d8aae0b84a425e3d81
-
SSDEEP
196608:3VlqWoIgu8D+uTwVt0ThYRYsOjbzZfOnqPjtLY+i:FBCiuTuuThYWsyZ2Ajt+
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2896 1600 rundll32.exe 83 PID 1600 wrote to memory of 2896 1600 rundll32.exe 83 PID 1600 wrote to memory of 2896 1600 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c84678de8bb2f508e61f66f67c4942850d3e5a69f669e352c2a0c635dbfaa7eeN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c84678de8bb2f508e61f66f67c4942850d3e5a69f669e352c2a0c635dbfaa7eeN.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2896
-