Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/12/2024, 04:42 UTC

General

  • Target

    a14aef1e027074a2b9e3b06cc2557ee3221a805b4a53471858e010e622cdfbb7N.dll

  • Size

    412KB

  • MD5

    d02e07b65bf2ab0537644efcf878e560

  • SHA1

    e148f290d5f95ab5c165ff6eb278d3cd4002e64f

  • SHA256

    a14aef1e027074a2b9e3b06cc2557ee3221a805b4a53471858e010e622cdfbb7

  • SHA512

    dcd44e295f582c59f87d2c2b76331dc78f79a7606fb2fbeae97c20ef60628b4a652d30e314c8f0971ec81fc5ea828417a7667902742de01f819fc5c169683589

  • SSDEEP

    6144:pYkbzmyl/7mYfSDHRoq1OGCXYZyVo+uOInJHW44dwO24Koi4Zzq7kM8nwNC:pvbzhgemOGCX/KJHWrqx4Koi4RqwJuC

Score
10/10

Malware Config

Signatures

  • Detects Strela Stealer payload 3 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a14aef1e027074a2b9e3b06cc2557ee3221a805b4a53471858e010e622cdfbb7N.dll
    1⤵
      PID:2100

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2100-1-0x00000000001A0000-0x0000000000200000-memory.dmp

      Filesize

      384KB

    • memory/2100-0-0x00000000001A0000-0x0000000000200000-memory.dmp

      Filesize

      384KB

    • memory/2100-2-0x00000000001A0000-0x0000000000200000-memory.dmp

      Filesize

      384KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.