Analysis

  • max time kernel
    142s
  • max time network
    130s
  • platform
    windows10-1703_x64
  • resource
    win10-20231129-en
  • resource tags

    arch:x64arch:x86image:win10-20231129-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/12/2023, 14:10

General

  • Target

    e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf.exe

  • Size

    190KB

  • MD5

    c6a8dfbca3283f2a4cc76d41b75279ea

  • SHA1

    c916b2402470cd067080796309c4eec84e524f34

  • SHA256

    e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf

  • SHA512

    e1a1592f2e10c426ecc2a2d0869be9340eff105a7c3b83868018ff81788fff6b443c6ffeab8412376e4967c26c9eaa4cb6709c3746fd7f6afff3ba765dd76bcb

  • SSDEEP

    3072:pbt/fZLXa6rlGe4EWiZMkp133kFkirCupzWnn0vNSch0bB+vBjZ5mAq:X/RLK6rse8wMkHUMKmOZh02BG

Malware Config

Extracted

Family

stealc

C2

http://77.91.76.36

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf.exe
    "C:\Users\Admin\AppData\Local\Temp\e7083d5d6b02b99606601d2484e404fc699623dcff41a853a1091103600bd3cf.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:1372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 1004
      2⤵
      • Program crash
      PID:432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1372-1-0x0000000000C20000-0x0000000000D20000-memory.dmp

    Filesize

    1024KB

  • memory/1372-2-0x0000000000BF0000-0x0000000000C0C000-memory.dmp

    Filesize

    112KB

  • memory/1372-3-0x0000000000400000-0x0000000000852000-memory.dmp

    Filesize

    4.3MB

  • memory/1372-4-0x0000000000400000-0x0000000000852000-memory.dmp

    Filesize

    4.3MB

  • memory/1372-5-0x0000000000400000-0x0000000000852000-memory.dmp

    Filesize

    4.3MB

  • memory/1372-6-0x0000000000C20000-0x0000000000D20000-memory.dmp

    Filesize

    1024KB

  • memory/1372-9-0x0000000000400000-0x0000000000852000-memory.dmp

    Filesize

    4.3MB

  • memory/1372-11-0x0000000000400000-0x0000000000852000-memory.dmp

    Filesize

    4.3MB

  • memory/1372-13-0x0000000000400000-0x0000000000852000-memory.dmp

    Filesize

    4.3MB