Analysis
-
max time kernel
16s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/07/2023, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
Fuse CC.exe
Resource
win7-20230712-en
General
-
Target
Fuse CC.exe
-
Size
749.8MB
-
MD5
2b09d7bb9cf9886f81f103558dbefa43
-
SHA1
8c70736bdb52305d3e295ff54547b3387778166e
-
SHA256
39a973d7341e94d962f89bf898ecb582d9798c7c8aad415551777aacbd18a90d
-
SHA512
98b721dc222f4ac91ea63921b7c265fe67c0f7d96693a426d8fa7ce2ee0e2ff2237bae7bfac679e5735c031d45019caf450555816ac1ea948c0d668d667900b4
-
SSDEEP
49152:kBuZrEUPwGjLiIX1LJLJZ2iZ3vxm3c7ld:6kLPwwLTXjXvm3ch
Malware Config
Extracted
stealc
http://185.161.248.78/eba140b7c5f2f228.php
Signatures
-
Detects Stealc stealer 4 IoCs
resource yara_rule behavioral1/memory/2776-84-0x00000000001B0000-0x00000000001C6000-memory.dmp family_stealc behavioral1/memory/2776-85-0x0000000000400000-0x0000000000629000-memory.dmp family_stealc behavioral1/memory/2776-146-0x0000000000400000-0x0000000000629000-memory.dmp family_stealc behavioral1/memory/2776-147-0x00000000001B0000-0x00000000001C6000-memory.dmp family_stealc -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2496 Fuse CC.tmp 2776 Sеtup.exe 1736 FCBAEHCAEG.exe -
Loads dropped DLL 7 IoCs
pid Process 2172 Fuse CC.exe 2496 Fuse CC.tmp 2496 Fuse CC.tmp 2776 Sеtup.exe 2776 Sеtup.exe 1996 cmd.exe 1996 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0008000000016d17-152.dat upx behavioral1/files/0x0008000000016d17-151.dat upx behavioral1/files/0x0008000000016d17-150.dat upx behavioral1/files/0x0008000000016d17-149.dat upx behavioral1/memory/1736-156-0x0000000001350000-0x00000000021AE000-memory.dmp upx behavioral1/memory/1736-157-0x0000000001350000-0x00000000021AE000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Windows\CurrentVersion\Run sidebar.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Sеtup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Sеtup.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2496 Fuse CC.tmp 2496 Fuse CC.tmp 2776 Sеtup.exe 2776 Sеtup.exe 2776 Sеtup.exe 2776 Sеtup.exe 2776 Sеtup.exe 2776 Sеtup.exe 2776 Sеtup.exe 2776 Sеtup.exe 2776 Sеtup.exe 2776 Sеtup.exe 2776 Sеtup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 Fuse CC.tmp -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2496 2172 Fuse CC.exe 30 PID 2172 wrote to memory of 2496 2172 Fuse CC.exe 30 PID 2172 wrote to memory of 2496 2172 Fuse CC.exe 30 PID 2172 wrote to memory of 2496 2172 Fuse CC.exe 30 PID 2172 wrote to memory of 2496 2172 Fuse CC.exe 30 PID 2172 wrote to memory of 2496 2172 Fuse CC.exe 30 PID 2172 wrote to memory of 2496 2172 Fuse CC.exe 30 PID 2496 wrote to memory of 2776 2496 Fuse CC.tmp 31 PID 2496 wrote to memory of 2776 2496 Fuse CC.tmp 31 PID 2496 wrote to memory of 2776 2496 Fuse CC.tmp 31 PID 2496 wrote to memory of 2776 2496 Fuse CC.tmp 31 PID 2776 wrote to memory of 1996 2776 Sеtup.exe 35 PID 2776 wrote to memory of 1996 2776 Sеtup.exe 35 PID 2776 wrote to memory of 1996 2776 Sеtup.exe 35 PID 2776 wrote to memory of 1996 2776 Sеtup.exe 35 PID 1996 wrote to memory of 1736 1996 cmd.exe 37 PID 1996 wrote to memory of 1736 1996 cmd.exe 37 PID 1996 wrote to memory of 1736 1996 cmd.exe 37 PID 1996 wrote to memory of 1736 1996 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fuse CC.exe"C:\Users\Admin\AppData\Local\Temp\Fuse CC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\is-TUQC6.tmp\Fuse CC.tmp"C:\Users\Admin\AppData\Local\Temp\is-TUQC6.tmp\Fuse CC.tmp" /SL5="$9001A,978165,844288,C:\Users\Admin\AppData\Local\Temp\Fuse CC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\Data\Sеtup.exe"C:\Users\Admin\Data\Sеtup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\FCBAEHCAEG.exe"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\FCBAEHCAEG.exe"C:\Users\Admin\AppData\Local\Temp\FCBAEHCAEG.exe"5⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\FCBAEHCAEG.exe6⤵PID:1072
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 07⤵PID:1660
-
-
-
-
-
-
-
C:\Program Files\Windows Sidebar\sidebar.exe"C:\Program Files\Windows Sidebar\sidebar.exe" /showGadgets1⤵
- Adds Run key to start application
PID:2792
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD514817abceacc2869286157bc5198ba30
SHA18d280a5abede4d4cfb2017ace6b172c69771d470
SHA256a0755055fec6800ed05b9f1c5c1a997a279a6b992a0eca4b0dc3789120ac4ad3
SHA512190825317c17477ea511f86f85476fa860728a1379e256415b6414b0fa43137322bcbbb37dd63ed4f67614efebbfd90667fc26d853bd92c3cd254405b637bec9
-
Filesize
4.3MB
MD514817abceacc2869286157bc5198ba30
SHA18d280a5abede4d4cfb2017ace6b172c69771d470
SHA256a0755055fec6800ed05b9f1c5c1a997a279a6b992a0eca4b0dc3789120ac4ad3
SHA512190825317c17477ea511f86f85476fa860728a1379e256415b6414b0fa43137322bcbbb37dd63ed4f67614efebbfd90667fc26d853bd92c3cd254405b637bec9
-
Filesize
3.0MB
MD54475e9ba18e48f121e5885a88a7f514d
SHA151056fcc1ab1cc5d242ef751c9a1508868b58fbb
SHA256f51a6b0ada2b30b7ceeab020fd3718e20c6ee97619e3c19f346cb0b257a50c63
SHA512b7fcab45d04e9397ca9590748b8b6637ff8993b4c427046e0ed7d5e01b228bb66ee27de7fe2371fecdb5b20b8f9964e5e4bc96c4aef00df208b0d1c8d3f79078
-
Filesize
3.0MB
MD54475e9ba18e48f121e5885a88a7f514d
SHA151056fcc1ab1cc5d242ef751c9a1508868b58fbb
SHA256f51a6b0ada2b30b7ceeab020fd3718e20c6ee97619e3c19f346cb0b257a50c63
SHA512b7fcab45d04e9397ca9590748b8b6637ff8993b4c427046e0ed7d5e01b228bb66ee27de7fe2371fecdb5b20b8f9964e5e4bc96c4aef00df208b0d1c8d3f79078
-
Filesize
206KB
MD5cf6a7ae795e3dcde632ab66eee90627c
SHA12c0498b668d3c474207c82ee6c0b8652daac1544
SHA2561c461f0da6e91f50fa1a22fca9c306b745669697110fa3ba71bbdf8851dd0268
SHA51269efe2b04bb0557fa0bd1e7304f48bed40d5d29a3a5dd444bba7cddba048892a9af8c7fbd70085be3acd90c254f0f6b29d94e4df994a3330cedaf22026f46992
-
Filesize
206KB
MD5cf6a7ae795e3dcde632ab66eee90627c
SHA12c0498b668d3c474207c82ee6c0b8652daac1544
SHA2561c461f0da6e91f50fa1a22fca9c306b745669697110fa3ba71bbdf8851dd0268
SHA51269efe2b04bb0557fa0bd1e7304f48bed40d5d29a3a5dd444bba7cddba048892a9af8c7fbd70085be3acd90c254f0f6b29d94e4df994a3330cedaf22026f46992
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
4.3MB
MD514817abceacc2869286157bc5198ba30
SHA18d280a5abede4d4cfb2017ace6b172c69771d470
SHA256a0755055fec6800ed05b9f1c5c1a997a279a6b992a0eca4b0dc3789120ac4ad3
SHA512190825317c17477ea511f86f85476fa860728a1379e256415b6414b0fa43137322bcbbb37dd63ed4f67614efebbfd90667fc26d853bd92c3cd254405b637bec9
-
Filesize
4.3MB
MD514817abceacc2869286157bc5198ba30
SHA18d280a5abede4d4cfb2017ace6b172c69771d470
SHA256a0755055fec6800ed05b9f1c5c1a997a279a6b992a0eca4b0dc3789120ac4ad3
SHA512190825317c17477ea511f86f85476fa860728a1379e256415b6414b0fa43137322bcbbb37dd63ed4f67614efebbfd90667fc26d853bd92c3cd254405b637bec9
-
Filesize
3.0MB
MD54475e9ba18e48f121e5885a88a7f514d
SHA151056fcc1ab1cc5d242ef751c9a1508868b58fbb
SHA256f51a6b0ada2b30b7ceeab020fd3718e20c6ee97619e3c19f346cb0b257a50c63
SHA512b7fcab45d04e9397ca9590748b8b6637ff8993b4c427046e0ed7d5e01b228bb66ee27de7fe2371fecdb5b20b8f9964e5e4bc96c4aef00df208b0d1c8d3f79078
-
Filesize
206KB
MD5cf6a7ae795e3dcde632ab66eee90627c
SHA12c0498b668d3c474207c82ee6c0b8652daac1544
SHA2561c461f0da6e91f50fa1a22fca9c306b745669697110fa3ba71bbdf8851dd0268
SHA51269efe2b04bb0557fa0bd1e7304f48bed40d5d29a3a5dd444bba7cddba048892a9af8c7fbd70085be3acd90c254f0f6b29d94e4df994a3330cedaf22026f46992
-
Filesize
206KB
MD5cf6a7ae795e3dcde632ab66eee90627c
SHA12c0498b668d3c474207c82ee6c0b8652daac1544
SHA2561c461f0da6e91f50fa1a22fca9c306b745669697110fa3ba71bbdf8851dd0268
SHA51269efe2b04bb0557fa0bd1e7304f48bed40d5d29a3a5dd444bba7cddba048892a9af8c7fbd70085be3acd90c254f0f6b29d94e4df994a3330cedaf22026f46992