Analysis
-
max time kernel
29s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 10:35
Static task
static1
Behavioral task
behavioral1
Sample
Cyber Hunter Install.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Cyber Hunter Install.exe
Resource
win10v2004-20231215-en
General
-
Target
Cyber Hunter Install.exe
-
Size
4.9MB
-
MD5
f836f277cbcadfecfc988bf350d410c3
-
SHA1
f9a66d7876a6eb09763e0705beaa999d99f53754
-
SHA256
d38bc9871b0eba08a6b77314a6d3fdc94531315c2659ea60d8d23b4450ed3838
-
SHA512
ac284e90bf72d564ceaeda28383efc8793f286002d2d7ae37f08f05a9170faa5f77a8e741cb60fabb1f48f9abc769070fc3620fa9c5d7dfce60029b6d58c8280
-
SSDEEP
12288:D6BeSpuojQEv1E729k4nRQ/ceb5WdWOeoP3/F+2nGr6A5zuzhGlC5LcB+cVgeMtb:E0yLW2mudcocIE
Malware Config
Extracted
marsstealer
Default
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Executes dropped EXE 1 IoCs
Processes:
9EM6.exepid process 280 9EM6.exe -
Loads dropped DLL 5 IoCs
Processes:
Cyber Hunter Install.exe9EM6.exepid process 1424 Cyber Hunter Install.exe 1424 Cyber Hunter Install.exe 280 9EM6.exe 280 9EM6.exe 280 9EM6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2600 280 WerFault.exe 9EM6.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
Cyber Hunter Install.exedescription pid process target process PID 1424 wrote to memory of 280 1424 Cyber Hunter Install.exe 9EM6.exe PID 1424 wrote to memory of 280 1424 Cyber Hunter Install.exe 9EM6.exe PID 1424 wrote to memory of 280 1424 Cyber Hunter Install.exe 9EM6.exe PID 1424 wrote to memory of 280 1424 Cyber Hunter Install.exe 9EM6.exe PID 1424 wrote to memory of 280 1424 Cyber Hunter Install.exe 9EM6.exe PID 1424 wrote to memory of 280 1424 Cyber Hunter Install.exe 9EM6.exe PID 1424 wrote to memory of 280 1424 Cyber Hunter Install.exe 9EM6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cyber Hunter Install.exe"C:\Users\Admin\AppData\Local\Temp\Cyber Hunter Install.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Low\9EM6.exe"C:\Users\Admin\AppData\Local\Temp\Low\9EM6.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 280 -s 6883⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Low\9EM6.exeFilesize
2KB
MD5ad2a95786622c0f8381c66ce6e288fe7
SHA1de37a2383d7af0889b8ed42b3194b2397b3adc60
SHA2563d7c0ca5f8ab355faa6a68764c66bee1a0167b092fa8c9ecaeeb245d26ff9bb6
SHA5122821472d13ef1d6f76c7639d1a9dc99b31ed0f52c7f897c1ae3df52a8b1764efa5a35ba5cafbb8d1847d1a913f160acd66245ddbda698f93844cb47dd9c53828
-
C:\Users\Admin\AppData\Local\Temp\Low\9EM6.exeFilesize
64KB
MD59e8bd0c01eeae0b737b7173a19f57f54
SHA1a012b9712f3a679d5fa11730c8ef50bc46df4043
SHA256318d4321992baefca7111142e79e57b34e4cecd9a28dae68a8f02527497138cb
SHA512f96409a47aebc0280bb20cc99e6cffe283f4798e46d1c621ffb4e9a2320d795fd71a2f8a7050fbe8af3953718a65bf536ea5acb62fa197d6cf8f105ca54c6784
-
C:\Users\Admin\AppData\Local\Temp\Low\9EM6.exeFilesize
114B
MD52e90ec096982c77ebaa32643f1994e5e
SHA1fc3210c512ff65339aedddc91aef4abe4f6affc4
SHA256be64e9677495910dd71ede0972593df3eca56dee3f7b37815057c32fcc2400c9
SHA5121478f16bef01e3e5c2133e26fb5f082c18b213a4772a2329fc3e34425bcce02e9be034e6df26185dc2c6bf75dcf4a110bb75c017d8487033ee7455a65a59f4cb
-
\Users\Admin\AppData\Local\Temp\Low\9EM6.exeFilesize
19KB
MD5da99603bd817156f0d8bdac42f172bae
SHA1fe0e5060e0c47dc10710d307f1b59dd170f5143c
SHA25671bc9d1045f3f69cc605a832ece745361a9158d32d6d6345f878792e4baa05b5
SHA51220974bec58c16155587a15d559d8dbf88954fa3939b44ad5634bef48feb40f19432cecbe80966dfb2a4257b1a6e1905caf145a569fdcef74948d7d7776232f31
-
\Users\Admin\AppData\Local\Temp\Low\9EM6.exeFilesize
22KB
MD510c03790d6fdc904a55829699743341d
SHA11881813b7b93c83b51e57759b8a31e6b2ca9920f
SHA256a9f2ecdbd7f5d69afeb810a7ad86809fdd01a554a1c08fdd78c4ca4a70508ad4
SHA5122ea2f35ff31d36b69a605196103a35cb3896d49a88255950ec7aef1b74b24865a1f61211bf435a05187e1e052e7ea28e30747b5c1e6d158c6a25378f87f40577
-
\Users\Admin\AppData\Local\Temp\Low\9EM6.exeFilesize
9KB
MD5fa7877e143e5b2741b0827c560052cc1
SHA1b2601aa10e9cc78b6b1abc7e953dd58cc803683c
SHA2565e06badedcb57a279b8a62bffe3952cfed6a46d0e0029ed4981bffc33cc3205c
SHA512259e98bb0f74a168f98fa14874a8d3a6cc9df09d3b7f47dfcfc99242596efec20a64b62ef9115ac32c4c2a8373298641b4ada3abfd411dd80f18f1155fbad73f
-
\Users\Admin\AppData\Local\Temp\Low\9EM6.exeFilesize
8KB
MD522df38149245332166da93dc0832cb5e
SHA1ef4b10ecb86d447fcd1c82213e7dcbf99a33ff14
SHA256f5f66c2cf65d6ee7bae56afc4b6b9224bcb5d84b21498fa2f1827f8228f915ba
SHA512d240cf09f0cfde21d3e4fb3edcff5fa7b9aa2f19e028aa677d0335b2eee87b145ae4527b552a200cf5edc58ac63368827df1130c1bba82dbbcb1e07851a0dc70
-
\Users\Admin\AppData\Local\Temp\Low\9EM6.exeFilesize
5KB
MD51c4ebb125ace66c85cf23f29c9ca1232
SHA1235dfaae412b4cf0e381ff56ab2153176e04235d
SHA2565be3892ef6593f47e557676e49dc9b224be3ff75e1f4911372d4e09728cecbdb
SHA51289d1580d3fd550463fe4c346f4733b31b3ab586b87040e958a5d7ccea794aab5a7c667871903cf79d32f387e4be688268833c48ed523cb059fece8aa937dfd63
-
\Users\Admin\AppData\Local\Temp\Low\9EM6.exeFilesize
24KB
MD565e7b5ac6f28a91b5b5b1abe71770786
SHA1388e80a0c7d3b154f4bbe580993b5a9bf747c2bc
SHA2567520380223337c8ab56a1f5859ea35efdf275f8fac8f143d1163aa821df9c02a
SHA51222bce4d2a57d381745847ea547943cd0c5d259148cd8646b811071643dfdeba2148fb39c885044c108c05eb092a952d3b9b6cf36fedc3500b592bb2aa67524f6
-
\Users\Admin\AppData\Local\Temp\Low\9EM6.exeFilesize
34KB
MD52a23d1270f39656241d7a12e4edf8431
SHA14451a3fe3c3c3e0f2064cb643426bc4dc93d59cc
SHA25695290e6266bc801fd2b9c8462e7e8a8f2166236056fcf971892b73ecb88d12ed
SHA512d1659baa75b151c9d1678ca12b9ead2c7822c4a4c7f48e62eca8647b8b0aab2734d853157e7f7b4705e4dcd2805472a8a1431e54e3e1b691302fec564774d474
-
\Users\Admin\AppData\Local\Temp\Low\9EM6.exeFilesize
35KB
MD5f4129211f87cf9c212bfc6e4c0a7b70a
SHA118d27c4c09f0fe198de9d0751e202a1011f023c5
SHA2567af58a818f70bcfb40237566b5f42fb98ace9f9dc74d45bc2824ce3d37ecd717
SHA512bc575eaeaa209c37c0071a48852d8d980100e077f7fe444b0109d6cfd89d8011e7ea539021a1486be4a2334cb63a12b7b99a7a04e3354305554ff35f3ca2bf00
-
memory/280-16-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1424-0-0x00000000011D0000-0x0000000001262000-memory.dmpFilesize
584KB
-
memory/1424-15-0x00000000006F0000-0x000000000072D000-memory.dmpFilesize
244KB
-
memory/1424-10-0x00000000006F0000-0x000000000072D000-memory.dmpFilesize
244KB