Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2023 06:34
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
General
-
Target
file.exe
-
Size
1.3MB
-
MD5
ceb62b6ac343ec808a818267e0ef4f6b
-
SHA1
d936107b1ebd5afe7c61db40c651c583b8b58487
-
SHA256
e08ffdbd935971d2ad62d3ecdb736d34302a230485de662a7f6fab81f39df48b
-
SHA512
88b4ed35a22a2dd19d3ee81f8dddfca9e2a871475ce965a5d0038612266d68fe2e50d9d53a89eba9d37f309c614eb218dfb25e75a20ac56ac54e753eca1c6a47
-
SSDEEP
24576:pYEtXdWl96ju5KGkcIGFI+kMixFDEHq55LOw:/Lg4sKG/IGFQXxZf55Lj
Malware Config
Extracted
stealc
http://5.75.155.1/d522566a552de05d.php
Extracted
laplas
http://51.195.166.203
-
api_key
b6fe9b83a8d3b268f74c16f34b6930cd2d2a47117a90beb53ffd773d00945a9e
Signatures
-
Detects Stealc stealer 1 IoCs
resource yara_rule behavioral2/memory/4344-217-0x0000000029350000-0x0000000029578000-memory.dmp family_stealc -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation JECGIIIDAK.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 2 IoCs
pid Process 1944 JECGIIIDAK.exe 2824 svcservice.exe -
Loads dropped DLL 2 IoCs
pid Process 4344 file.exe 4344 file.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" JECGIIIDAK.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4344 file.exe 4344 file.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4344 wrote to memory of 1252 4344 file.exe 88 PID 4344 wrote to memory of 1252 4344 file.exe 88 PID 4344 wrote to memory of 1252 4344 file.exe 88 PID 1252 wrote to memory of 1944 1252 cmd.exe 90 PID 1252 wrote to memory of 1944 1252 cmd.exe 90 PID 1252 wrote to memory of 1944 1252 cmd.exe 90 PID 1944 wrote to memory of 2824 1944 JECGIIIDAK.exe 94 PID 1944 wrote to memory of 2824 1944 JECGIIIDAK.exe 94 PID 1944 wrote to memory of 2824 1944 JECGIIIDAK.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JECGIIIDAK.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\JECGIIIDAK.exe"C:\Users\Admin\AppData\Local\Temp\JECGIIIDAK.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"4⤵
- Executes dropped EXE
PID:2824
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
3.3MB
MD5f00d6cb32f2c13da8b8f920c8ea33af7
SHA13c98141b93f6f44eceb0abef293bfd288f8d8db5
SHA256bc04fd14960109a4ba9c93cc85f8772d7aa242700f44fd7c1e984fc3980807d1
SHA512391b3a6b008dd26a56e2778578b8633e488876dbc048158eb6c2289fffde5554fba2a08fe67488083ddc6744d1135048c5a420b85c9f3cb8142dcb1ac9d0de3b
-
Filesize
3.3MB
MD5f00d6cb32f2c13da8b8f920c8ea33af7
SHA13c98141b93f6f44eceb0abef293bfd288f8d8db5
SHA256bc04fd14960109a4ba9c93cc85f8772d7aa242700f44fd7c1e984fc3980807d1
SHA512391b3a6b008dd26a56e2778578b8633e488876dbc048158eb6c2289fffde5554fba2a08fe67488083ddc6744d1135048c5a420b85c9f3cb8142dcb1ac9d0de3b
-
Filesize
584.1MB
MD546b64ab23b46d4252cefd18985b30de0
SHA1c80544897a8c42b17a95c8077c6857e4fe59b1f7
SHA2568c7f09168b6ea2f4a51162f068cd4fd7a33414be5920d40c5a1f979dad6e16d1
SHA512ddb35380957f7edbbd45b176caf55108b7cce136f9ce29c4e8644b82d0e92f4641d33a152dd5a1ad60251ab60ba1c9f50f939542fa62d4dd29d3ca83206ab18b
-
Filesize
517.6MB
MD5243a2d0bf25d8c137d3e5e380bf44b12
SHA19204fa8ddd33b478768d5d9df6dd36c13b85d518
SHA256c65074369112218a471b6902a5f5760e0f9fce41d71fefb3f76ca6147c7311c0
SHA5126874f664365ba10b719c0235b7d1633ad7143d96d083f13662497968de2ac5c89f35c3563c2425a08ff505079575b8ee2fad72417d65726fde12be664c71545d
-
Filesize
630.6MB
MD57cb600834701cb9173cc83cf33336f19
SHA17846143f72c6316bd16ed61b18e90ea58e5bd2f3
SHA256edfeb95421a2ed3c1c92ad64f8bdc8b5914ded2a7a2fd4fdeac7164c3b2e22fb
SHA5124da92c66916cfa6d9caad06d29f86f4186c0532bdd6129c0e0261047f011f9958612e7bb795d504155e94173431d0e05270d7d8192228e071827927fa4810945