Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 02:45

General

  • Target

    9375e3eb67235b7e130f5e32aacf8e169109fc124f80c7720b9beb035f0c0b9f.dll

  • Size

    464KB

  • MD5

    314b63ad36f289d899ee3941dfb9c944

  • SHA1

    cda927cf7782794905f22c260c98339f71552286

  • SHA256

    9375e3eb67235b7e130f5e32aacf8e169109fc124f80c7720b9beb035f0c0b9f

  • SHA512

    09f468a91b191f37812a9b17325058ec89a2dede008569dc361a35fe96f7192521831b00432af317b44de8dfab6e1e00cb01322dc7bde7754c1d01b60cfc0770

  • SSDEEP

    12288:KmNiNBJhvj6iQjh3wR0+qClsIyFxc4ldUrbBhKlKIEuq:KmNizahZ+NVf4i9+KIE9

Score
10/10

Malware Config

Signatures

  • Detects Strela Stealer payload 3 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\9375e3eb67235b7e130f5e32aacf8e169109fc124f80c7720b9beb035f0c0b9f.dll
    1⤵
      PID:2056

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2056-1-0x0000000000140000-0x00000000001B4000-memory.dmp

      Filesize

      464KB

    • memory/2056-0-0x0000000000140000-0x00000000001B4000-memory.dmp

      Filesize

      464KB

    • memory/2056-2-0x0000000000140000-0x00000000001B4000-memory.dmp

      Filesize

      464KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.