Analysis
-
max time kernel
104s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 20:00
Behavioral task
behavioral1
Sample
6ad7f44ed304835017bc89a680219c61b68b1c72a1f79adffc5a1160b2e1b069.dll
Resource
win7-20240729-en
General
-
Target
6ad7f44ed304835017bc89a680219c61b68b1c72a1f79adffc5a1160b2e1b069.dll
-
Size
92KB
-
MD5
f50556239a741206415dfff7412de774
-
SHA1
fd958c9bc835e1687f29a39372e1a948f5e1f6e5
-
SHA256
6ad7f44ed304835017bc89a680219c61b68b1c72a1f79adffc5a1160b2e1b069
-
SHA512
2f7135d801b57c8d86202a85796d9d776bf6a386d2a228ffcf2e13fa4d51cce238afc517b293b42ca640239a8ef8c43874ba8841e7782b24e7375c35744dc5bf
-
SSDEEP
1536:RJaYOFIols/Cxpz6lotZrU75ctmlrYseImnPxqqPDzwkSIhb0c94McE2B7chOdL:RJajaOoC5ZQ7StmaznPpgT20gSPB7chQ
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2 1660 rundll32.exe 5 1660 rundll32.exe 6 1660 rundll32.exe 7 1660 rundll32.exe 8 1660 rundll32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1660 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1660 2324 rundll32.exe 29 PID 2324 wrote to memory of 1660 2324 rundll32.exe 29 PID 2324 wrote to memory of 1660 2324 rundll32.exe 29 PID 2324 wrote to memory of 1660 2324 rundll32.exe 29 PID 2324 wrote to memory of 1660 2324 rundll32.exe 29 PID 2324 wrote to memory of 1660 2324 rundll32.exe 29 PID 2324 wrote to memory of 1660 2324 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ad7f44ed304835017bc89a680219c61b68b1c72a1f79adffc5a1160b2e1b069.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6ad7f44ed304835017bc89a680219c61b68b1c72a1f79adffc5a1160b2e1b069.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1660
-