Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 06:57

General

  • Target

    7a1255978cde4bcaeb25c658bbf1c5adca8906335de5b2309de517c0fba4c87dN.dll

  • Size

    390KB

  • MD5

    d95343297e663fbe93042bfccdfd80d0

  • SHA1

    0f42b0d6f61ec3521ddee93c7c8479859c6109f3

  • SHA256

    7a1255978cde4bcaeb25c658bbf1c5adca8906335de5b2309de517c0fba4c87d

  • SHA512

    6d232cd03279c9744bbfffc5e54e1d9df02423bfd906ffa84c8a89ba54472a6530997693c661ca8f2af5fa5be3404ea646bdacf82dfb5565b3f7b2e405f4d25a

  • SSDEEP

    6144:9GsvZQ6wFHRbi8wunhuAKDz0zbaLH5mnqdrcBnu++9ql7VlBhq0QYgUfB:906wFxO8LxKDzbeqrcqqVVlBtQYf

Score
10/10

Malware Config

Signatures

  • Detects Strela Stealer payload 3 IoCs
  • Strela family
  • Strela stealer

    An info stealer targeting mail credentials first seen in late 2022.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7a1255978cde4bcaeb25c658bbf1c5adca8906335de5b2309de517c0fba4c87dN.dll
    1⤵
      PID:4680

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4680-1-0x0000000002250000-0x00000000022B0000-memory.dmp

      Filesize

      384KB

    • memory/4680-0-0x0000000002250000-0x00000000022B0000-memory.dmp

      Filesize

      384KB

    • memory/4680-3-0x0000000002250000-0x00000000022B0000-memory.dmp

      Filesize

      384KB