Analysis
-
max time kernel
1s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2023 01:33
Static task
static1
Behavioral task
behavioral1
Sample
SENSIXDPANNEL.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SENSIXDPANNEL.exe
Resource
win10v2004-20231215-en
General
-
Target
SENSIXDPANNEL.exe
-
Size
433KB
-
MD5
40cf5b7e5c505da78a7f66d2950effbf
-
SHA1
abf961c5b9fae57411a195a00b4c7093d2fe0bc4
-
SHA256
911221ce521f77139ecfa2a277c277aaee6bff7094d9c5b31b893a4b104dea48
-
SHA512
08cbfc073c2d0f63a9b2711a81dd30809cb87eb2310ffd5b2a582a1e9ca0ebd5956093e83453310cba25a403aa28bf7cfcb3725a017188d48e66cccccb190bc5
-
SSDEEP
12288:pyVG1u73Do/eGm5uRWlgfS7BCag7MJQIGhJNsx61V0wrY4FS9:IGS6WRN+JGxS
Malware Config
Extracted
marsstealer
Default
www.moscow-post.com/wp-content/plugins/toocreate/tuzerfd.php
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 232 4844 WerFault.exe L.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SENSIXDPANNEL.exe"C:\Users\Admin\AppData\Local\Temp\SENSIXDPANNEL.exe"1⤵PID:2116
-
C:\Users\Admin\AppData\Roaming\Adobe\L.exe"C:\Users\Admin\AppData\Roaming\Adobe\L.exe"2⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 13683⤵
- Program crash
PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4844 -ip 48441⤵PID:1444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Adobe\L.exeFilesize
36KB
MD53b3d7a4500761ca84d9d060c3b77437d
SHA174d7fba2cfdbe34191c2fe1aa36b7ed3995279cc
SHA256bd4650300f929ea8c6442c3574a6629bc86a3edb1a39778559328894bca2be34
SHA51216f8a79214c167aa063e081083843d5af0c71281fd1b047e87e061d1b864f919c0b51c65b165f6f293eb0839023f7befee3413143c84d82f433efe145350dfae
-
C:\Users\Admin\AppData\Roaming\Adobe\L.exeFilesize
100KB
MD5779bc23c1e13c1b409d464bb986720a0
SHA1c8e81a0fdaca96a8566ff9ea2614d42ccc701b07
SHA2564c0e6994cedf121de14548a4bebb88434d1409dfff4264dbfc0712653f742a95
SHA512bb5e5c3c46d72156b8f57acfbcfa76da0bac70a9f135811698c2694358a30a5a90d11226fec96c0d869523346c1a9167054b3b94d39b08bda6e0045abb0bfbff
-
C:\Users\Admin\AppData\Roaming\Adobe\L.exeFilesize
30KB
MD5c5d74382ca1e73f71acb2a84b5c8e57d
SHA121d83e38b948c9e172fb2c46df2837f1885053b9
SHA2567dbe7ad3e376025592e7e3c1bfe032c0c2e8ef9cc5012e3dc571ad3fd525e06c
SHA5125d6497d93d719d753f17cb7e0b26216dcea90270d01b314324374a5302d06c483f04541316cec0d9305b03a5fd3e0048ea7d4dcb3478dfec51baf1cf3273a437
-
memory/2116-1-0x0000000074930000-0x00000000750E0000-memory.dmpFilesize
7.7MB
-
memory/2116-2-0x0000000004C30000-0x0000000004C40000-memory.dmpFilesize
64KB
-
memory/2116-0-0x0000000000170000-0x00000000001E2000-memory.dmpFilesize
456KB
-
memory/2116-13-0x0000000074930000-0x00000000750E0000-memory.dmpFilesize
7.7MB
-
memory/4844-12-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4844-15-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB