Analysis

  • max time kernel
    122s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    16-10-2023 06:19

General

  • Target

    jpg.exe

  • Size

    15.9MB

  • MD5

    0b5c5dc081a7e01b760181c5b1ae3547

  • SHA1

    54621ef8e008778cb9cd71558ee4c5352c1a18f6

  • SHA256

    de01413f03f6d36b4869bf9fc14276d1fb50de291d3ca22f5922696bc57e9f47

  • SHA512

    45240b65e27bc151aaa53e8d6d708a350d05090cd42b061d463a05ca2c82204f56bb4c8a2e7e753c8b863d2275de282e74e8ca556f3d4df8512d69303aa4775a

  • SSDEEP

    393216:IthzQ0/bbd5zOAiIpXT1vQylqq9eWTwFLPqQ7Rc3gE9sdMC:u7/bbd5CgpXTtTVeL7RBa

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://91.212.166.95

Attributes
  • url_path

    /08f7c1a754119dda.php

rc4.plain

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\jpg.exe
    "C:\Users\Admin\AppData\Local\Temp\jpg.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\jpg.exe
      "C:\Users\Admin\AppData\Local\Temp\jpg.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 44
        3⤵
        • Program crash
        PID:2708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2220-11-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2220-1-0x0000000000320000-0x0000000001312000-memory.dmp

    Filesize

    15.9MB

  • memory/2220-2-0x0000000005240000-0x0000000005280000-memory.dmp

    Filesize

    256KB

  • memory/2220-3-0x00000000090C0000-0x000000000A01A000-memory.dmp

    Filesize

    15.4MB

  • memory/2220-0-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2264-4-0x00000000000F0000-0x000000000031D000-memory.dmp

    Filesize

    2.2MB

  • memory/2264-5-0x00000000000F0000-0x000000000031D000-memory.dmp

    Filesize

    2.2MB

  • memory/2264-6-0x00000000000F0000-0x000000000031D000-memory.dmp

    Filesize

    2.2MB

  • memory/2264-7-0x00000000000F0000-0x000000000031D000-memory.dmp

    Filesize

    2.2MB

  • memory/2264-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2264-10-0x00000000000F0000-0x000000000031D000-memory.dmp

    Filesize

    2.2MB

  • memory/2264-13-0x00000000000F0000-0x000000000031D000-memory.dmp

    Filesize

    2.2MB

  • memory/2264-15-0x00000000000F0000-0x000000000031D000-memory.dmp

    Filesize

    2.2MB