Analysis

  • max time kernel
    92s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 01:09

General

  • Target

    06766e20c4a20b2b01f72733153cb7abb5ab77e841d17e1cf5d2f0d39a7a3258N.dll

  • Size

    379KB

  • MD5

    f3acf13ac2e6ea7b28663333289f5110

  • SHA1

    79bdf8c161c662b3cf59f8a216c094dc816e4769

  • SHA256

    06766e20c4a20b2b01f72733153cb7abb5ab77e841d17e1cf5d2f0d39a7a3258

  • SHA512

    11e14edecafe98a7ab83283740595551db0ab5a590de53f0d548e5d353b69b5ae0d3fc501f8f117b36d439d0e4b47a998f1eafd820951748432f5deee9d57ebe

  • SSDEEP

    6144:M4y+kAm3Y38smKnFmIfgAghwYp8PXzvYsYwPYvaDQlgg/IHUpXb:M49kAiY30ygAghwVjrVEul0pX

Score
10/10

Malware Config

Signatures

  • Detects Strela Stealer payload 3 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\06766e20c4a20b2b01f72733153cb7abb5ab77e841d17e1cf5d2f0d39a7a3258N.dll
    1⤵
      PID:2536

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2536-0-0x0000000001E10000-0x0000000001E70000-memory.dmp

      Filesize

      384KB

    • memory/2536-1-0x0000000001E10000-0x0000000001E70000-memory.dmp

      Filesize

      384KB

    • memory/2536-2-0x0000000001E10000-0x0000000001E70000-memory.dmp

      Filesize

      384KB