Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 03:37

General

  • Target

    92214e2aa631f14b336bfa9e1e7af350b7d99ffd75f5b0ef7782d0b1811dd10f.dll

  • Size

    395KB

  • MD5

    e0c9a603eb342efbb2067ce2372b8221

  • SHA1

    b53c82f7f9c91682d6bfcd77f8603d119a8ea5d0

  • SHA256

    92214e2aa631f14b336bfa9e1e7af350b7d99ffd75f5b0ef7782d0b1811dd10f

  • SHA512

    4a9be6d4a7ecf9bc8a3898716ac842fa0fb156c141cf8240607bad8d0f5ea69adf70b74aa2a879108a7b3c615464657ace5d39aa723170f7e4730f93baf13747

  • SSDEEP

    6144:FHc4yqFHRbi8wunhuAKDz0zbaLH5mnqdrcBnu++9ql7VlBhq0QYgUfB:Bc4yqFxO8LxKDzbeqrcqqVVlBtQYf

Score
10/10

Malware Config

Signatures

  • Detects Strela Stealer payload 3 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\92214e2aa631f14b336bfa9e1e7af350b7d99ffd75f5b0ef7782d0b1811dd10f.dll
    1⤵
      PID:2084

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2084-0-0x0000000001D50000-0x0000000001DB0000-memory.dmp

      Filesize

      384KB

    • memory/2084-1-0x0000000001D50000-0x0000000001DB0000-memory.dmp

      Filesize

      384KB

    • memory/2084-2-0x0000000001D50000-0x0000000001DB0000-memory.dmp

      Filesize

      384KB