Analysis
-
max time kernel
137s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2022 09:16
Static task
static1
Behavioral task
behavioral1
Sample
InstallerNPW.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
InstallerNPW.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
InstallerNPW.exe
-
Size
505.1MB
-
MD5
a7181bdf496d2c79b321f14de2598680
-
SHA1
c4f30ccc90fe2a4c392a8c7f665b831c04757553
-
SHA256
5390a252d7d09aa1a46aca97c8fd9642adac289a6a33d9fc6d3eb1b3f5c0194d
-
SHA512
a94a43eb45f30d8cfe1144c90d642480d93100cea6c77f693d25318abc98a30a279a443da5fe67e4356922ae7be651d0775361742b16cc0232c6c7c1c4f58bbe
-
SSDEEP
6144:gCFtTT32Sw1eIKWgpxAOzuuXUXs/nEcYY6rpohYxNJgIzMfKkve4uQLl8+:dHT32SwAguXUc/nr6rDxzUSyPLq+
Score
10/10
Malware Config
Extracted
Family
marsstealer
Botnet
Default
C2
46.3.197.98/hsdf7w34rhdjsf.php
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1672 set thread context of 3924 1672 InstallerNPW.exe 82 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1672 wrote to memory of 3924 1672 InstallerNPW.exe 82 PID 1672 wrote to memory of 3924 1672 InstallerNPW.exe 82 PID 1672 wrote to memory of 3924 1672 InstallerNPW.exe 82 PID 1672 wrote to memory of 3924 1672 InstallerNPW.exe 82 PID 1672 wrote to memory of 3924 1672 InstallerNPW.exe 82 PID 1672 wrote to memory of 3924 1672 InstallerNPW.exe 82 PID 1672 wrote to memory of 3924 1672 InstallerNPW.exe 82 PID 1672 wrote to memory of 3924 1672 InstallerNPW.exe 82 PID 1672 wrote to memory of 3924 1672 InstallerNPW.exe 82 PID 1672 wrote to memory of 3924 1672 InstallerNPW.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\InstallerNPW.exe"C:\Users\Admin\AppData\Local\Temp\InstallerNPW.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\InstallerNPW.exe"C:\Users\Admin\AppData\Local\Temp\InstallerNPW.exe"2⤵PID:3924
-