Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 06:47

General

  • Target

    c6aabb27450f1a9939a417e86bf53217.dll

  • Size

    1.2MB

  • MD5

    c6aabb27450f1a9939a417e86bf53217

  • SHA1

    b8ef3bb7575139fd6997379415d7119e452b5fc4

  • SHA256

    b91a3743c7399aee454491862e015ef6fc668a25d1aa2816e065a86a03f6be35

  • SHA512

    e5fe205cb0f419e0a320488d6fa4a70e5ed58f25b570b41412ebd4f32bbe504ff75acb20bfea22513102630cf653a41e5090051f20af2ed3aadb53ce16a05944

  • SSDEEP

    24576:BO//kL3TtMhQsnoXyajMK8fCZEqcAxQBuLv8YPKpTG:z3pMhQzRM3MfcAxHv8t

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c6aabb27450f1a9939a417e86bf53217.dll,#1
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Windows\system32\netsh.exe
      netsh wlan show profiles
      2⤵
      • Event Triggered Execution: Netsh Helper DLL
      • System Network Configuration Discovery: Wi-Fi Discovery
      PID:3176
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\227495264221_Desktop.zip' -CompressionLevel Optimal
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\227495264221_Desktop.zip

    Filesize

    41KB

    MD5

    dfb1d19fb6fab5d8c5dedc56a98ce890

    SHA1

    061c6fd11e67f52bb529992b194df0130a055b45

    SHA256

    dc5beafebf2bf3fba28614033847bb2ecd35e954f5163c04b66ef0820a6d7f39

    SHA512

    0a49165edb99ed741a16befccbbfe5cbd2b2427fd4eacd762d12c058ac0b6ad14006459e83f4f01d6b2ba8ed6d50e370a4a817a699118815a2bebe6c62ed9ca1

  • C:\Users\Admin\AppData\Local\Temp\_Files_\RenameRestart.xlsx

    Filesize

    13KB

    MD5

    6016bd55ad4cd7aa0a2867ef35bbde02

    SHA1

    cf1d6557327b2291d3137556a4b843f55a0e50cd

    SHA256

    8306a2d4d65914537e6fe8f4b7eaa36c2937c345d9a06a4d7027b0db431381e7

    SHA512

    ff6ac3cf86f5b120e3c41ed814cc2c0689a227721619e569a2d8c83391c72a2fea2b3899f1237e543adae8fd1fa18bf5d64e8695b3a9f43f9301388e971397bb

  • C:\Users\Admin\AppData\Local\Temp\_Files_\RenameSave.xlsx

    Filesize

    9KB

    MD5

    e6e51b485d9b419eeadda7caf4fe9456

    SHA1

    c32f015afb0501ad2231dea86156aa09891e21da

    SHA256

    fac0e9cd2ab2abe8e4a76ca8124f10f1f3b889ee5f041d826982b4497482faed

    SHA512

    9932cfa26636845e412b94aad36ddb77948fc08d5149222c2b79b1bfceb5012a7bc3e517bee5624615eacb5554c18d453bfa6dd94cf058bb1c71a24565edb2a7

  • C:\Users\Admin\AppData\Local\Temp\_Files_\RepairHide.docx

    Filesize

    14KB

    MD5

    f2ef7d262b2096c644d9a9484f7c76ee

    SHA1

    0aa95f3aed42423badc4d5f21403e361156ef4fd

    SHA256

    cb40dfadb4d5bb2e3a47ea0f9dc7b5b120fc2188279a13480ef1617ab61accdf

    SHA512

    851f4bb84adb9f2d4135428a569fcae3da8ca04d60ae77b76be20f6ab2faa3480b1c61f5e7881384cf13512cf04bc8dbe2ec1501feaefdbe48f7fd7497f471e0

  • C:\Users\Admin\AppData\Local\Temp\_Files_\SendClose.xlsx

    Filesize

    14KB

    MD5

    3452fe6e02b630c0cf1086fb6f7f50d0

    SHA1

    46506d5f7a50663d05c88517a87038a75f38b6d9

    SHA256

    b8202936dd9bf1668f136a6847c44107f47f821d434233790567113277953d11

    SHA512

    0f8c54843cab6f9077f4654fb5dd0e49108c0461e71e387debe871b776cab7d2b39ab70aaba1a60d48eb8cb7957ac1d5aaf16a7a2178b1b015452ee97ff568b3

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2v5ewemi.c1u.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1708-15-0x00007FFB27780000-0x00007FFB28241000-memory.dmp

    Filesize

    10.8MB

  • memory/1708-18-0x0000020EF7F60000-0x0000020EF7F6A000-memory.dmp

    Filesize

    40KB

  • memory/1708-17-0x0000020EFA3D0000-0x0000020EFA3E2000-memory.dmp

    Filesize

    72KB

  • memory/1708-16-0x00007FFB27780000-0x00007FFB28241000-memory.dmp

    Filesize

    10.8MB

  • memory/1708-4-0x00007FFB27783000-0x00007FFB27785000-memory.dmp

    Filesize

    8KB

  • memory/1708-26-0x00007FFB27780000-0x00007FFB28241000-memory.dmp

    Filesize

    10.8MB

  • memory/1708-14-0x0000020EFA160000-0x0000020EFA182000-memory.dmp

    Filesize

    136KB