Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29/03/2023, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
9735a5a6882e9fe7578d745f8a693b50.exe
Resource
win7-20230220-en
General
-
Target
9735a5a6882e9fe7578d745f8a693b50.exe
-
Size
1.3MB
-
MD5
9735a5a6882e9fe7578d745f8a693b50
-
SHA1
2cb86a0a4cafc825bf413f057ce067da7f802f74
-
SHA256
f49d931295e2da64727db9d3d867051232d54f0b2aad5c2cee896b40aa0e86fe
-
SHA512
7b6ded7b2dd74f399006223f523c294a546f11af9c00b5958ce6ed6734c916688ea8a59d6e961e40a65b633859b74e9f7635e100f72c0004830704d4e8a1b01b
-
SSDEEP
24576:29Cv53II5kebo7w0AshMGqOI0LslSIpO4u6+/3:2EII5Vo7w3shHoSk+v
Malware Config
Extracted
stealc
http://5.75.155.1/d522566a552de05d.php
Extracted
laplas
http://51.195.166.203
-
api_key
b6fe9b83a8d3b268f74c16f34b6930cd2d2a47117a90beb53ffd773d00945a9e
Signatures
-
Detects Stealc stealer 1 IoCs
resource yara_rule behavioral1/memory/1064-158-0x0000000028E20000-0x0000000029048000-memory.dmp family_stealc -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1960 AAEGHJKJKK.exe 1308 svcservice.exe -
Loads dropped DLL 6 IoCs
pid Process 1064 9735a5a6882e9fe7578d745f8a693b50.exe 1064 9735a5a6882e9fe7578d745f8a693b50.exe 1580 cmd.exe 1580 cmd.exe 1960 AAEGHJKJKK.exe 1960 AAEGHJKJKK.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" AAEGHJKJKK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9735a5a6882e9fe7578d745f8a693b50.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9735a5a6882e9fe7578d745f8a693b50.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4 9735a5a6882e9fe7578d745f8a693b50.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 9735a5a6882e9fe7578d745f8a693b50.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 9735a5a6882e9fe7578d745f8a693b50.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2796BAE63F1801E277261BA0D77770028F20EEE4\Blob = 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 9735a5a6882e9fe7578d745f8a693b50.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1064 9735a5a6882e9fe7578d745f8a693b50.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1580 1064 9735a5a6882e9fe7578d745f8a693b50.exe 29 PID 1064 wrote to memory of 1580 1064 9735a5a6882e9fe7578d745f8a693b50.exe 29 PID 1064 wrote to memory of 1580 1064 9735a5a6882e9fe7578d745f8a693b50.exe 29 PID 1064 wrote to memory of 1580 1064 9735a5a6882e9fe7578d745f8a693b50.exe 29 PID 1580 wrote to memory of 1960 1580 cmd.exe 31 PID 1580 wrote to memory of 1960 1580 cmd.exe 31 PID 1580 wrote to memory of 1960 1580 cmd.exe 31 PID 1580 wrote to memory of 1960 1580 cmd.exe 31 PID 1960 wrote to memory of 1308 1960 AAEGHJKJKK.exe 32 PID 1960 wrote to memory of 1308 1960 AAEGHJKJKK.exe 32 PID 1960 wrote to memory of 1308 1960 AAEGHJKJKK.exe 32 PID 1960 wrote to memory of 1308 1960 AAEGHJKJKK.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9735a5a6882e9fe7578d745f8a693b50.exe"C:\Users\Admin\AppData\Local\Temp\9735a5a6882e9fe7578d745f8a693b50.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\AAEGHJKJKK.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\AAEGHJKJKK.exe"C:\Users\Admin\AppData\Local\Temp\AAEGHJKJKK.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"4⤵
- Executes dropped EXE
PID:1308
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
3.3MB
MD5f00d6cb32f2c13da8b8f920c8ea33af7
SHA13c98141b93f6f44eceb0abef293bfd288f8d8db5
SHA256bc04fd14960109a4ba9c93cc85f8772d7aa242700f44fd7c1e984fc3980807d1
SHA512391b3a6b008dd26a56e2778578b8633e488876dbc048158eb6c2289fffde5554fba2a08fe67488083ddc6744d1135048c5a420b85c9f3cb8142dcb1ac9d0de3b
-
Filesize
3.3MB
MD5f00d6cb32f2c13da8b8f920c8ea33af7
SHA13c98141b93f6f44eceb0abef293bfd288f8d8db5
SHA256bc04fd14960109a4ba9c93cc85f8772d7aa242700f44fd7c1e984fc3980807d1
SHA512391b3a6b008dd26a56e2778578b8633e488876dbc048158eb6c2289fffde5554fba2a08fe67488083ddc6744d1135048c5a420b85c9f3cb8142dcb1ac9d0de3b
-
Filesize
355.3MB
MD515fa0d78270791272b1a2ad5b4425757
SHA1385a246d71d7ef84d7f5f91896305b2d4c425aee
SHA25698cac83bb687aed3332234a038ae826205973b9f0f6fed949985c3965a975a01
SHA512b14320a974d0c5c40153784c86dad606e2e2c7495965e7786e9be71fb9908392030f5c0454f57c497f7718b665a935dc02a2f101a777ec687511f942b7fc91f8
-
Filesize
343.5MB
MD596a07d3754ac549455ae9107f971baac
SHA1deff7ec60bf1d47f1cb2e9a2547ec16602533ee9
SHA25637b76a5ffcc60c27eed5c22bd24498f9564f8a1dddb234bfcb447f075b04dd95
SHA512291df6ce61321bfb7754157acc4da030cb58c23a7b19e1eaae10fc0c9659402709fb183e5d732ae6a392665819b0e23b4135a220717a974cc1a0ab7eeafee4f3
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
3.3MB
MD5f00d6cb32f2c13da8b8f920c8ea33af7
SHA13c98141b93f6f44eceb0abef293bfd288f8d8db5
SHA256bc04fd14960109a4ba9c93cc85f8772d7aa242700f44fd7c1e984fc3980807d1
SHA512391b3a6b008dd26a56e2778578b8633e488876dbc048158eb6c2289fffde5554fba2a08fe67488083ddc6744d1135048c5a420b85c9f3cb8142dcb1ac9d0de3b
-
Filesize
3.3MB
MD5f00d6cb32f2c13da8b8f920c8ea33af7
SHA13c98141b93f6f44eceb0abef293bfd288f8d8db5
SHA256bc04fd14960109a4ba9c93cc85f8772d7aa242700f44fd7c1e984fc3980807d1
SHA512391b3a6b008dd26a56e2778578b8633e488876dbc048158eb6c2289fffde5554fba2a08fe67488083ddc6744d1135048c5a420b85c9f3cb8142dcb1ac9d0de3b
-
Filesize
362.4MB
MD5a94e476450461c1ecc527fb17f47e01e
SHA135cc4c18c7a75ef59dd8e02a10926d81afd3893e
SHA256943cf2e57e6475ea77e90bf13113c6bdd022191b4cb5b321ebc9514fa4ffcec6
SHA512938323b89980efde69ba945d7516b500ee24badbf977d0e45a0ec87918ae69e8cab5733d6bfb37a46982562a247578e5b418f07c6a86d2e70381a9145467afce
-
Filesize
358.5MB
MD598b1d4dbecda62b23a414a8f2213dfde
SHA1258aeff967e1a690662d0dfed33357779e853771
SHA2561871d457767559a302ce3e774e2d82ef52f76b1776ba55366db495df89c32c47
SHA512022e66da16a5cfb35f2bac943c475ef54a3d34c1e3929306b66378ccc844735b05d8b57413e9ecbbb870efcd8cb9173f44c812d0eea51bfdd1a6a7765b66eb48