Analysis
-
max time kernel
1s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 09:48
Static task
static1
Behavioral task
behavioral1
Sample
l81rhzIPTizNWD6pnZPRSFEDal16Xy1T.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
l81rhzIPTizNWD6pnZPRSFEDal16Xy1T.exe
Resource
win10v2004-20231222-en
General
-
Target
l81rhzIPTizNWD6pnZPRSFEDal16Xy1T.exe
-
Size
13.4MB
-
MD5
6e08d023664e3f4e835ec3ec198b883a
-
SHA1
43f2f3321a51f1ca308af891d2e1dbaaee48b045
-
SHA256
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad
-
SHA512
41d44ed76ecda43eab891a2e07cb43481478c39797e44ed017654a8bca346b90bfcf4f444532d8e9765173c2e9b26d5f524fe42ec9a7830230fedbe21f9e0ec1
-
SSDEEP
12288:bu5DqC9/n1D0jAV8eCeoIl1TroJMExsi+vakV7tbQ3KtwU:buDXVsUThTFyJm
Malware Config
Extracted
marsstealer
Default
moscow-post.com/xaoniu/server/waungowangued/g.php
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4700 4016 WerFault.exe .exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\l81rhzIPTizNWD6pnZPRSFEDal16Xy1T.exe"C:\Users\Admin\AppData\Local\Temp\l81rhzIPTizNWD6pnZPRSFEDal16Xy1T.exe"1⤵
-
C:\Users\Admin\AppData\Roaming\Adobe\.exe"C:\Users\Admin\AppData\Roaming\Adobe\.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 14163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4016 -ip 40161⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Adobe\.exeFilesize
81KB
MD542df9c28ba938997af3ee506c249a5d6
SHA1b12690ee805951fddb9848404cc7ca650eaad825
SHA2563a60de2b6bf8d391f66fc7cb4bde35ba96d9db4d0693e2efe19b0ee1bef1066c
SHA5128e1767f77a16c55eebf0ea898b21869c5e76ef6e205ce4fe6eed5aa76b92927d7d634f970146502a77163a13ec1149922aca2a0bf9015db725912dc4c8a72c88
-
C:\Users\Admin\AppData\Roaming\Adobe\.exeFilesize
41KB
MD59cfb967a9021a68af8ba9625de647c72
SHA1275aa0aaec18de91da422401890867a27fe2b30a
SHA25658463b674705529b68d016c8b5984676bedcf24af915a576f0151e20afa1d5fd
SHA5129aaf5fd4afe43860c3e9193563a3e3a3d18326fa9400f93dd8f1172f1550c3c85d2b12cd12b2f90d9641b5a7fb83e4fde087ee4ebf1a1826c5498c21ae6f5127
-
C:\Users\Admin\AppData\Roaming\Adobe\.exeFilesize
112KB
MD54f0ae11aa2016788fae2bc5de69c71fd
SHA1409140aa07e41557eafc02ea3a7467410c6427fd
SHA256b708f9a92c2fdfc06d4f0112fe3799173c994014566c984a69eeae35b1c44263
SHA512c132cf8ed15bf124aa40e8b7f0a00bfa32eca1b94b27b50ef3f2f16c80adadb45626ad0a439acf57aa4b697d8adcaedbab0084f9270b4cef86fedf96a113596f
-
memory/4016-12-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4016-15-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4976-1-0x00000000746D0000-0x0000000074E80000-memory.dmpFilesize
7.7MB
-
memory/4976-2-0x00000000058D0000-0x00000000058E0000-memory.dmpFilesize
64KB
-
memory/4976-0-0x0000000000DF0000-0x0000000000E72000-memory.dmpFilesize
520KB
-
memory/4976-13-0x00000000746D0000-0x0000000074E80000-memory.dmpFilesize
7.7MB