Analysis

  • max time kernel
    168s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 10:16

General

  • Target

    4995dd92f42b45ca046759f42ce337df.exe

  • Size

    255KB

  • MD5

    4995dd92f42b45ca046759f42ce337df

  • SHA1

    7561c6f18b40a312f81b4f30e16ac71e059be61d

  • SHA256

    a6c16d02123a02fd12cb80beaa6483948ffb5385a2aafdcdee701720e85933cb

  • SHA512

    660dbbeed532c9365ae11f182be7e859af5eb3ddb4b1c772cb83bc41acb72aa0455c4cf7757da159decb32293a575ee87b80577a01704445a9f4a12826ed375b

  • SSDEEP

    3072:Psn0ypTCufla+0FF5QpCIUeHdSEA/5wslpYK:En0yxLfla356CaxX

Malware Config

Extracted

Family

stealc

C2

http://elijahdiego.top

Attributes
  • url_path

    /e9c345fc99a4e67e.php

rc4.plain

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Downloads MZ/PE file
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4995dd92f42b45ca046759f42ce337df.exe
    "C:\Users\Admin\AppData\Local\Temp\4995dd92f42b45ca046759f42ce337df.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1952-1-0x0000000002480000-0x0000000002580000-memory.dmp

    Filesize

    1024KB

  • memory/1952-2-0x00000000023F0000-0x000000000240B000-memory.dmp

    Filesize

    108KB

  • memory/1952-3-0x0000000000400000-0x000000000227E000-memory.dmp

    Filesize

    30.5MB

  • memory/1952-4-0x0000000002480000-0x0000000002580000-memory.dmp

    Filesize

    1024KB

  • memory/1952-5-0x0000000000400000-0x000000000227E000-memory.dmp

    Filesize

    30.5MB

  • memory/1952-6-0x00000000023F0000-0x000000000240B000-memory.dmp

    Filesize

    108KB