Analysis
-
max time kernel
180s -
max time network
201s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
28-10-2023 18:17
Static task
static1
General
-
Target
6f49cca8b3fe1ff8022805fbf29225511e68e5480a3795ff60a3f178efa20481.exe
-
Size
1.1MB
-
MD5
e04d70d7dca38d3695c770e4746ddc72
-
SHA1
bad8a7de9782f69e748d927cc7473138a23042aa
-
SHA256
6f49cca8b3fe1ff8022805fbf29225511e68e5480a3795ff60a3f178efa20481
-
SHA512
016574249cbc92c4f119051d4f0da1356ac294b01766730e011f58fdce5ebdde519349136c58e578c832d9e74992bac212119ef9498948d53989137aa50239e2
-
SSDEEP
24576:8eh4biccwWcz+9N+gigYb484ecjxJjpZ/FA9:8j4EmZN4
Malware Config
Extracted
Family
stealc
C2
http://tetromask.site
Attributes
-
url_path
/b5c586aec2e1004c.php
rc4.plain
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3772 3084 WerFault.exe 70 384 3084 WerFault.exe 70 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6f49cca8b3fe1ff8022805fbf29225511e68e5480a3795ff60a3f178efa20481.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6f49cca8b3fe1ff8022805fbf29225511e68e5480a3795ff60a3f178efa20481.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3084 6f49cca8b3fe1ff8022805fbf29225511e68e5480a3795ff60a3f178efa20481.exe 3084 6f49cca8b3fe1ff8022805fbf29225511e68e5480a3795ff60a3f178efa20481.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f49cca8b3fe1ff8022805fbf29225511e68e5480a3795ff60a3f178efa20481.exe"C:\Users\Admin\AppData\Local\Temp\6f49cca8b3fe1ff8022805fbf29225511e68e5480a3795ff60a3f178efa20481.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 11762⤵
- Program crash
PID:3772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 11682⤵
- Program crash
PID:384
-