Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
12-12-2023 05:55
Static task
static1
Behavioral task
behavioral1
Sample
015da94a48702bde0297911a4872469d9f4851d5067acf3fbbd412cbe82377ef.exe
Resource
win7-20231130-en
General
-
Target
015da94a48702bde0297911a4872469d9f4851d5067acf3fbbd412cbe82377ef.exe
-
Size
190KB
-
MD5
c3cda4284fab6d48c2781c7e78dded15
-
SHA1
e0e6d1711ba8afcd402f232214a76bf3f9efa7ef
-
SHA256
015da94a48702bde0297911a4872469d9f4851d5067acf3fbbd412cbe82377ef
-
SHA512
9a188c5573f9fffcf3f487a40822f857ff0db995ecba5ad4b77ddc88b5964e89c58bc864d7960f77e218a6a159caaeda8d35bdda9712e9d3b2805ca04fb33a53
-
SSDEEP
3072:IJW9jLf7NyT1TAT2l3NUvtgDtvA2aGjxxkpzeJsV5kZ6q:l9jLzNyT1i43WODJA2TjxupIR
Malware Config
Extracted
stealc
http://77.91.76.36
-
url_path
/3886d2276f6914c4.php
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 015da94a48702bde0297911a4872469d9f4851d5067acf3fbbd412cbe82377ef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 015da94a48702bde0297911a4872469d9f4851d5067acf3fbbd412cbe82377ef.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1664 015da94a48702bde0297911a4872469d9f4851d5067acf3fbbd412cbe82377ef.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\015da94a48702bde0297911a4872469d9f4851d5067acf3fbbd412cbe82377ef.exe"C:\Users\Admin\AppData\Local\Temp\015da94a48702bde0297911a4872469d9f4851d5067acf3fbbd412cbe82377ef.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1664