Analysis
-
max time kernel
78s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
27-06-2023 09:51
Static task
static1
Behavioral task
behavioral1
Sample
b39e78e8dc2c983b3587fffcfd242f05.exe
Resource
win7-20230621-en
General
-
Target
b39e78e8dc2c983b3587fffcfd242f05.exe
-
Size
262KB
-
MD5
b39e78e8dc2c983b3587fffcfd242f05
-
SHA1
4648b28f5a8596687e6ad8f20e4ab7642ffc346c
-
SHA256
dccdb6e16d2f01e46e021c8887b7353a841d7fce133ec2cb37a5781230ade52e
-
SHA512
28f4accbf55be67b1d7e670a4759b658d337127334ce4231abe27b3b33fe52823243aa1f016deb9f36bf57e814c6f13d6af7e4693e28e9bfb1fd771917b0d7bd
-
SSDEEP
6144:yU2rW27We/4m0cy2MN3hLcjC9mUWpzTIW:KWul/kX7
Malware Config
Extracted
stealc
http://p�etzelsget.top/3886d2276f6914c4.php
Signatures
-
Detects Stealc stealer 5 IoCs
resource yara_rule behavioral1/memory/820-55-0x0000000000240000-0x0000000000256000-memory.dmp family_stealc behavioral1/memory/820-56-0x0000000000400000-0x0000000000629000-memory.dmp family_stealc behavioral1/memory/820-60-0x0000000000400000-0x0000000000629000-memory.dmp family_stealc behavioral1/memory/820-80-0x0000000000400000-0x0000000000629000-memory.dmp family_stealc behavioral1/memory/820-93-0x0000000000400000-0x0000000000629000-memory.dmp family_stealc -
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 1772 cmd.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b39e78e8dc2c983b3587fffcfd242f05.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b39e78e8dc2c983b3587fffcfd242f05.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 544 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 820 b39e78e8dc2c983b3587fffcfd242f05.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 820 wrote to memory of 1772 820 b39e78e8dc2c983b3587fffcfd242f05.exe 30 PID 820 wrote to memory of 1772 820 b39e78e8dc2c983b3587fffcfd242f05.exe 30 PID 820 wrote to memory of 1772 820 b39e78e8dc2c983b3587fffcfd242f05.exe 30 PID 820 wrote to memory of 1772 820 b39e78e8dc2c983b3587fffcfd242f05.exe 30 PID 1772 wrote to memory of 544 1772 cmd.exe 32 PID 1772 wrote to memory of 544 1772 cmd.exe 32 PID 1772 wrote to memory of 544 1772 cmd.exe 32 PID 1772 wrote to memory of 544 1772 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b39e78e8dc2c983b3587fffcfd242f05.exe"C:\Users\Admin\AppData\Local\Temp\b39e78e8dc2c983b3587fffcfd242f05.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\b39e78e8dc2c983b3587fffcfd242f05.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:544
-
-