Analysis
-
max time kernel
122s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16-10-2023 06:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
jpg.exe
Resource
win7-20230831-en
windows7-x64
4 signatures
150 seconds
General
-
Target
jpg.exe
-
Size
15.9MB
-
MD5
0b5c5dc081a7e01b760181c5b1ae3547
-
SHA1
54621ef8e008778cb9cd71558ee4c5352c1a18f6
-
SHA256
de01413f03f6d36b4869bf9fc14276d1fb50de291d3ca22f5922696bc57e9f47
-
SHA512
45240b65e27bc151aaa53e8d6d708a350d05090cd42b061d463a05ca2c82204f56bb4c8a2e7e753c8b863d2275de282e74e8ca556f3d4df8512d69303aa4775a
-
SSDEEP
393216:IthzQ0/bbd5zOAiIpXT1vQylqq9eWTwFLPqQ7Rc3gE9sdMC:u7/bbd5CgpXTtTVeL7RBa
Malware Config
Extracted
Family
stealc
C2
http://91.212.166.95
Attributes
-
url_path
/08f7c1a754119dda.php
rc4.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 2264 2220 jpg.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 2708 2264 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2220 wrote to memory of 2264 2220 jpg.exe 28 PID 2264 wrote to memory of 2708 2264 jpg.exe 29 PID 2264 wrote to memory of 2708 2264 jpg.exe 29 PID 2264 wrote to memory of 2708 2264 jpg.exe 29 PID 2264 wrote to memory of 2708 2264 jpg.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\jpg.exe"C:\Users\Admin\AppData\Local\Temp\jpg.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\jpg.exe"C:\Users\Admin\AppData\Local\Temp\jpg.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 443⤵
- Program crash
PID:2708
-
-