Analysis
-
max time kernel
142s -
max time network
130s -
platform
windows10-1703_x64 -
resource
win10-20231129-en -
resource tags
arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system -
submitted
11/12/2023, 14:10
Static task
static1
1 signatures
General
-
Target
e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf.exe
-
Size
190KB
-
MD5
c6a8dfbca3283f2a4cc76d41b75279ea
-
SHA1
c916b2402470cd067080796309c4eec84e524f34
-
SHA256
e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf
-
SHA512
e1a1592f2e10c426ecc2a2d0869be9340eff105a7c3b83868018ff81788fff6b443c6ffeab8412376e4967c26c9eaa4cb6709c3746fd7f6afff3ba765dd76bcb
-
SSDEEP
3072:pbt/fZLXa6rlGe4EWiZMkp133kFkirCupzWnn0vNSch0bB+vBjZ5mAq:X/RLK6rse8wMkHUMKmOZh02BG
Malware Config
Extracted
Family
stealc
C2
http://77.91.76.36
Attributes
-
url_path
/3886d2276f6914c4.php
rc4.plain
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 432 1372 WerFault.exe 55 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1372 e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf.exe 1372 e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf.exe"C:\Users\Admin\AppData\Local\Temp\e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 10042⤵
- Program crash
PID:432
-