Analysis
-
max time kernel
168s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 10:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4995dd92f42b45ca046759f42ce337df.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
4995dd92f42b45ca046759f42ce337df.exe
-
Size
255KB
-
MD5
4995dd92f42b45ca046759f42ce337df
-
SHA1
7561c6f18b40a312f81b4f30e16ac71e059be61d
-
SHA256
a6c16d02123a02fd12cb80beaa6483948ffb5385a2aafdcdee701720e85933cb
-
SHA512
660dbbeed532c9365ae11f182be7e859af5eb3ddb4b1c772cb83bc41acb72aa0455c4cf7757da159decb32293a575ee87b80577a01704445a9f4a12826ed375b
-
SSDEEP
3072:Psn0ypTCufla+0FF5QpCIUeHdSEA/5wslpYK:En0yxLfla356CaxX
Malware Config
Extracted
Family
stealc
C2
http://elijahdiego.top
Attributes
-
url_path
/e9c345fc99a4e67e.php
rc4.plain
Signatures
-
Downloads MZ/PE file
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4995dd92f42b45ca046759f42ce337df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4995dd92f42b45ca046759f42ce337df.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1952 4995dd92f42b45ca046759f42ce337df.exe 1952 4995dd92f42b45ca046759f42ce337df.exe