Analysis

  • max time kernel
    78s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2023 09:51

General

  • Target

    b39e78e8dc2c983b3587fffcfd242f05.exe

  • Size

    262KB

  • MD5

    b39e78e8dc2c983b3587fffcfd242f05

  • SHA1

    4648b28f5a8596687e6ad8f20e4ab7642ffc346c

  • SHA256

    dccdb6e16d2f01e46e021c8887b7353a841d7fce133ec2cb37a5781230ade52e

  • SHA512

    28f4accbf55be67b1d7e670a4759b658d337127334ce4231abe27b3b33fe52823243aa1f016deb9f36bf57e814c6f13d6af7e4693e28e9bfb1fd771917b0d7bd

  • SSDEEP

    6144:yU2rW27We/4m0cy2MN3hLcjC9mUWpzTIW:KWul/kX7

Malware Config

Extracted

Family

stealc

C2

http://p�etzelsget.top/3886d2276f6914c4.php

Signatures

  • Detects Stealc stealer 5 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b39e78e8dc2c983b3587fffcfd242f05.exe
    "C:\Users\Admin\AppData\Local\Temp\b39e78e8dc2c983b3587fffcfd242f05.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\b39e78e8dc2c983b3587fffcfd242f05.exe" & del "C:\ProgramData\*.dll"" & exit
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 5
        3⤵
        • Delays execution with timeout.exe
        PID:544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/820-54-0x0000000000220000-0x0000000000235000-memory.dmp

    Filesize

    84KB

  • memory/820-55-0x0000000000240000-0x0000000000256000-memory.dmp

    Filesize

    88KB

  • memory/820-56-0x0000000000400000-0x0000000000629000-memory.dmp

    Filesize

    2.2MB

  • memory/820-60-0x0000000000400000-0x0000000000629000-memory.dmp

    Filesize

    2.2MB

  • memory/820-62-0x0000000061E00000-0x0000000061EF3000-memory.dmp

    Filesize

    972KB

  • memory/820-80-0x0000000000400000-0x0000000000629000-memory.dmp

    Filesize

    2.2MB

  • memory/820-93-0x0000000000400000-0x0000000000629000-memory.dmp

    Filesize

    2.2MB