Analysis
-
max time kernel
290s -
max time network
254s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
20-11-2023 04:48
Static task
static1
Behavioral task
behavioral1
Sample
2720fa06afe988c9a488ebc705fa2f00125e9ce41caf403937aa0d92aa1c6a50.exe
Resource
win7-20231023-en
General
-
Target
2720fa06afe988c9a488ebc705fa2f00125e9ce41caf403937aa0d92aa1c6a50.exe
-
Size
257KB
-
MD5
aea383524f41d2cbdcb2ac5cd9248ef9
-
SHA1
1e0ef5cafb008037544687c3728ef0ff6ae42c9e
-
SHA256
2720fa06afe988c9a488ebc705fa2f00125e9ce41caf403937aa0d92aa1c6a50
-
SHA512
5010f0de8ab4cc255cf98413c32f6fe428e5032a80e96143d64f42ec60ec39f5c9efc98262273693bd9d7b6d97b278ddeda1bae509f2aa2c087323b27a04aa76
-
SSDEEP
3072:e4Puwi2V4HDjh5lTLJvZ10zvB6T0nduF6cdVjYb5YRBo7ovb9Py:eG3mDZLJB6z7jMkucM
Malware Config
Extracted
stealc
http://giuliotoro.icu
-
url_path
/40d570f44e84a454.php
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2176 4496 WerFault.exe 70 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2720fa06afe988c9a488ebc705fa2f00125e9ce41caf403937aa0d92aa1c6a50.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2720fa06afe988c9a488ebc705fa2f00125e9ce41caf403937aa0d92aa1c6a50.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4496 2720fa06afe988c9a488ebc705fa2f00125e9ce41caf403937aa0d92aa1c6a50.exe 4496 2720fa06afe988c9a488ebc705fa2f00125e9ce41caf403937aa0d92aa1c6a50.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2720fa06afe988c9a488ebc705fa2f00125e9ce41caf403937aa0d92aa1c6a50.exe"C:\Users\Admin\AppData\Local\Temp\2720fa06afe988c9a488ebc705fa2f00125e9ce41caf403937aa0d92aa1c6a50.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 11522⤵
- Program crash
PID:2176
-