Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 01:21

General

  • Target

    911221ce521f77139ecfa2a277c277aaee6bff7094d9c5b31b893a4b104dea48.exe

  • Size

    433KB

  • MD5

    40cf5b7e5c505da78a7f66d2950effbf

  • SHA1

    abf961c5b9fae57411a195a00b4c7093d2fe0bc4

  • SHA256

    911221ce521f77139ecfa2a277c277aaee6bff7094d9c5b31b893a4b104dea48

  • SHA512

    08cbfc073c2d0f63a9b2711a81dd30809cb87eb2310ffd5b2a582a1e9ca0ebd5956093e83453310cba25a403aa28bf7cfcb3725a017188d48e66cccccb190bc5

  • SSDEEP

    12288:pyVG1u73Do/eGm5uRWlgfS7BCag7MJQIGhJNsx61V0wrY4FS9:IGS6WRN+JGxS

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

www.moscow-post.com/wp-content/plugins/toocreate/tuzerfd.php

Signatures

  • Mars Stealer

    An infostealer written in C++ based on other infostealers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\911221ce521f77139ecfa2a277c277aaee6bff7094d9c5b31b893a4b104dea48.exe
    "C:\Users\Admin\AppData\Local\Temp\911221ce521f77139ecfa2a277c277aaee6bff7094d9c5b31b893a4b104dea48.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Roaming\Microsoft\IOWU.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\IOWU.exe"
      2⤵
      • Executes dropped EXE
      PID:1480
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 1412
        3⤵
        • Program crash
        PID:2744
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1480 -ip 1480
    1⤵
      PID:1900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\IOWU.exe
      Filesize

      159KB

      MD5

      53eb0bcc17ccf65660a7266e3287ebd6

      SHA1

      c4f2201da904be4882a104d6a291f70aebefb0a6

      SHA256

      7a391340b6677f74bcf896b5cc16a470543e2a384049df47949038df5e770df1

      SHA512

      2c6e157e34721fdc1fb17db73423afbcda9c9c45d61376a220c353a9af73c8aa7237525b4a15d55864762fc07868ab2f71c801a87d0a2cd60cae0fb49c4fbbaa

    • memory/1172-0-0x0000000000800000-0x0000000000872000-memory.dmp
      Filesize

      456KB

    • memory/1172-1-0x0000000074E60000-0x0000000075610000-memory.dmp
      Filesize

      7.7MB

    • memory/1172-2-0x00000000052F0000-0x0000000005300000-memory.dmp
      Filesize

      64KB

    • memory/1172-13-0x0000000074E60000-0x0000000075610000-memory.dmp
      Filesize

      7.7MB

    • memory/1480-10-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB

    • memory/1480-15-0x0000000000400000-0x000000000043D000-memory.dmp
      Filesize

      244KB