Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 00:53

General

  • Target

    b8728704320ba8a65e2efbd42d32196e52bb8e92083c7f066fc09ba2969cf886N.dll

  • Size

    396KB

  • MD5

    9b1041cb0f346edd879cce9b7251fbc0

  • SHA1

    9e37c8299ea2c9ec4d50580044e1cb14b8d7f750

  • SHA256

    b8728704320ba8a65e2efbd42d32196e52bb8e92083c7f066fc09ba2969cf886

  • SHA512

    a16c83a8281145f660cfe69b6e94cb1dc67e97f8046a7516f26f850c965bb310864703da962f4de4dd420a137b99585d2d7c97e175a275379c13319c3fc79458

  • SSDEEP

    6144:/IV95p4y+kAm3Y38smKnFmIfgAghwYp8PXzvYsYwPYvaDQlgg/IHUpXb:gj5p49kAiY30ygAghwVjrVEul0pX

Score
10/10

Malware Config

Signatures

  • Detects Strela Stealer payload 3 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\b8728704320ba8a65e2efbd42d32196e52bb8e92083c7f066fc09ba2969cf886N.dll
    1⤵
      PID:2364

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2364-1-0x0000000002770000-0x00000000027D0000-memory.dmp

      Filesize

      384KB

    • memory/2364-0-0x0000000002770000-0x00000000027D0000-memory.dmp

      Filesize

      384KB

    • memory/2364-2-0x0000000002770000-0x00000000027D0000-memory.dmp

      Filesize

      384KB