Analysis
-
max time kernel
121s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 20:30
Behavioral task
behavioral1
Sample
5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe
Resource
win10-20231023-en
General
-
Target
5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe
-
Size
101KB
-
MD5
a6395f652c356dbcf03a082e37853f9c
-
SHA1
aac503dfad03154cb41f8f9f66a2f1c69a2b9d78
-
SHA256
5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557
-
SHA512
b65791845dc3ce2b4136c8dffba5e55e2d143bb68090a58ec8e38f1e534adf151b41e887cfa2c8eaf94afcc0d0f9d2292024ca80296f927ef8b956a0b6186d2d
-
SSDEEP
3072:TK0ufpwQ5jXl9t6Swu6bCYf5z46CyOVfFgtI:20uiQ9jtpf4DHO/gt
Malware Config
Extracted
stealc
http://94.142.138.179
-
url_path
/518893e599328c52.php
Signatures
-
Deletes itself 1 IoCs
pid Process 2996 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2508 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2840 5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2996 2840 5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe 31 PID 2840 wrote to memory of 2996 2840 5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe 31 PID 2840 wrote to memory of 2996 2840 5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe 31 PID 2840 wrote to memory of 2996 2840 5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe 31 PID 2996 wrote to memory of 2508 2996 cmd.exe 33 PID 2996 wrote to memory of 2508 2996 cmd.exe 33 PID 2996 wrote to memory of 2508 2996 cmd.exe 33 PID 2996 wrote to memory of 2508 2996 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe"C:\Users\Admin\AppData\Local\Temp\5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\5ebb58edcd349c0e4e5322953c82031c8bbc570511f096e8fb7b902ddb0e9557.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2508
-
-