Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 08:03
Static task
static1
Behavioral task
behavioral1
Sample
ARK_Trainer_v0.9.9.9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ARK_Trainer_v0.9.9.9.exe
Resource
win10v2004-20231215-en
General
-
Target
ARK_Trainer_v0.9.9.9.exe
-
Size
8.7MB
-
MD5
185eb9ebbb379bf2b5dd37e5ed92eee1
-
SHA1
d9da98bcb2259cb1da248267d1568c3cec591fae
-
SHA256
21a174a42902e4e830e224ea8943c76f1a0730edafa280a99b09b5597c96af95
-
SHA512
45e9cbefef733d17c807e7f316f8be3f464c64008356eaa198802845f450b94f09f8cd2a529941ac57f4a78d5e5c98779d0900d23840ed865859e065ad1a56cc
-
SSDEEP
12288:FSooBq+S++WsHX+sFICSPSrmjwoCah2mVZ6B7AnebCaLvi4mWY:NYN+SPYK9neSW
Malware Config
Extracted
marsstealer
Default
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Executes dropped EXE 1 IoCs
Processes:
IWLVPUQF6KMPJ.exepid process 3000 IWLVPUQF6KMPJ.exe -
Loads dropped DLL 5 IoCs
Processes:
ARK_Trainer_v0.9.9.9.exeWerFault.exepid process 1752 ARK_Trainer_v0.9.9.9.exe 1752 ARK_Trainer_v0.9.9.9.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2468 3000 WerFault.exe IWLVPUQF6KMPJ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ARK_Trainer_v0.9.9.9.exeIWLVPUQF6KMPJ.exedescription pid process target process PID 1752 wrote to memory of 3000 1752 ARK_Trainer_v0.9.9.9.exe IWLVPUQF6KMPJ.exe PID 1752 wrote to memory of 3000 1752 ARK_Trainer_v0.9.9.9.exe IWLVPUQF6KMPJ.exe PID 1752 wrote to memory of 3000 1752 ARK_Trainer_v0.9.9.9.exe IWLVPUQF6KMPJ.exe PID 1752 wrote to memory of 3000 1752 ARK_Trainer_v0.9.9.9.exe IWLVPUQF6KMPJ.exe PID 3000 wrote to memory of 2468 3000 IWLVPUQF6KMPJ.exe WerFault.exe PID 3000 wrote to memory of 2468 3000 IWLVPUQF6KMPJ.exe WerFault.exe PID 3000 wrote to memory of 2468 3000 IWLVPUQF6KMPJ.exe WerFault.exe PID 3000 wrote to memory of 2468 3000 IWLVPUQF6KMPJ.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ARK_Trainer_v0.9.9.9.exe"C:\Users\Admin\AppData\Local\Temp\ARK_Trainer_v0.9.9.9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\ProgramData\Start Menu\IWLVPUQF6KMPJ.exe"C:\ProgramData\Start Menu\IWLVPUQF6KMPJ.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 8043⤵
- Loads dropped DLL
- Program crash
PID:2468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\IWLVPUQF6KMPJ.exeFilesize
17KB
MD5249d7643798c617e309e8c71e3a95eee
SHA1edd1c277ad7622af6fc287d80cb094811df39cbc
SHA2563aaf4a21759c804747aa2723f263c2c1766d155064e1dbbcf2a912c23781ff09
SHA512934a29d5a69348f7371e19a6d80348b7f4e9fd2c76d06b40ae3c82eb6bf5fcf7da895a826ed150d64d9ae27b1b9c1d2193a68703983d929c6381526085667f81
-
C:\ProgramData\Microsoft\Windows\Start Menu\IWLVPUQF6KMPJ.exeFilesize
59KB
MD55041d4345a924b71f9c12773218df4c5
SHA1ebb0069cb966d467e200b46e5e22c6f7cf77fb67
SHA256e265be835410c7af1d86f0a97b926a1feaefc3b9c72ee8414fbbafa7b12ab4e1
SHA512273f45d2594ae615b9b155b6adc78f1984aa602af0f84d721fd8b3b4852aadd310e2bb8964d514bc451e8b92116c044cb3de15a1c0c073fbd915f3a08f9bd229
-
\ProgramData\Microsoft\Windows\Start Menu\IWLVPUQF6KMPJ.exeFilesize
159KB
MD580ffae827667bd2a86cc1d1b17745ba3
SHA1dae012b46c61ce189319b7d04a7d405db3f733f2
SHA256dd9285cabf5ff86f34600c4b947c5cb2d442fed6391b14b52c6f0c94c8fff276
SHA5124ac4ecbd086bd340879676f2c7d3d83b684f0c3ba688dc9a289910c531b1d90ad67c34fc799c51a65c1339d52533aacaed117eedd847fa024232b882908c9442
-
\ProgramData\Microsoft\Windows\Start Menu\IWLVPUQF6KMPJ.exeFilesize
25KB
MD52f8f1d086fd6bfb63a2281df5ae3220f
SHA16e2ea45bc04b74addda0cae668005d52c58fa4fd
SHA256128cb13ec879ef14d50a35bfc0b4e31dea4cf7230f9a6c9254ac5db5ce502305
SHA51209377493356112275600e522d5fa10f76ba5b3f75588625a6b3c158155de24d660c5785bb052ec545f69bb2cccb145c933352da2dd5e1772b9ab89d82c77d4d2
-
\ProgramData\Microsoft\Windows\Start Menu\IWLVPUQF6KMPJ.exeFilesize
23KB
MD5ab81b273d009a664727cfdc941c8e67a
SHA1ebff03cb364fa420a5d69b2e4aa633d264eb7034
SHA256fbc18ac69e4960abd6b2f79671cb724b6f37d2ed723d9d5f7a515f925ff58f32
SHA512a05fc819a3fe8ad0723344689e9d5dd4c9296235cfab2945050f20c66d2f15eb336dca4eacedf112b4bc578eb56033d48d46bb23e15fa090bc961a5ff1f855f6
-
memory/1752-0-0x0000000001130000-0x00000000011BE000-memory.dmpFilesize
568KB
-
memory/1752-1-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/1752-2-0x00000000010E0000-0x0000000001120000-memory.dmpFilesize
256KB
-
memory/1752-13-0x0000000074060000-0x000000007474E000-memory.dmpFilesize
6.9MB
-
memory/1752-12-0x0000000000C00000-0x0000000000C3D000-memory.dmpFilesize
244KB
-
memory/1752-11-0x0000000000C00000-0x0000000000C3D000-memory.dmpFilesize
244KB
-
memory/3000-14-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB