Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20/09/2023, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
3e12eef5b30432fcaeb036fcdbdf2157.exe
Resource
win7-20230831-en
General
-
Target
3e12eef5b30432fcaeb036fcdbdf2157.exe
-
Size
206KB
-
MD5
3e12eef5b30432fcaeb036fcdbdf2157
-
SHA1
746a2b497001ece110cc10d1b9bea4db478beddc
-
SHA256
ed60d9c899ba23a867933062048cce9a9b5ab81379fd2adde648288a74662404
-
SHA512
67fbeb3308803bd4217db4006dd0aef90bdeab1f924689132f61df3289e69ef3780139932c42a039eb2656a1c56fffbc509164177b2a1bbac77a84f5af8a41aa
-
SSDEEP
6144:hkKYLDY81hHNIxTGyKrvWI3VzIvU5tig8YT:hkbPY81JNIl6fv5uI
Malware Config
Extracted
stealc
http://christopherant�nio.top
-
url_path
/e9c345fc99a4e67e.php
Signatures
-
Deletes itself 1 IoCs
pid Process 2608 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3e12eef5b30432fcaeb036fcdbdf2157.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3e12eef5b30432fcaeb036fcdbdf2157.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2840 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1968 3e12eef5b30432fcaeb036fcdbdf2157.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2608 1968 3e12eef5b30432fcaeb036fcdbdf2157.exe 28 PID 1968 wrote to memory of 2608 1968 3e12eef5b30432fcaeb036fcdbdf2157.exe 28 PID 1968 wrote to memory of 2608 1968 3e12eef5b30432fcaeb036fcdbdf2157.exe 28 PID 1968 wrote to memory of 2608 1968 3e12eef5b30432fcaeb036fcdbdf2157.exe 28 PID 2608 wrote to memory of 2840 2608 cmd.exe 30 PID 2608 wrote to memory of 2840 2608 cmd.exe 30 PID 2608 wrote to memory of 2840 2608 cmd.exe 30 PID 2608 wrote to memory of 2840 2608 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e12eef5b30432fcaeb036fcdbdf2157.exe"C:\Users\Admin\AppData\Local\Temp\3e12eef5b30432fcaeb036fcdbdf2157.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3e12eef5b30432fcaeb036fcdbdf2157.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2840
-
-