Analysis
-
max time kernel
0s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 07:51
Static task
static1
Behavioral task
behavioral1
Sample
ShellGPT4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ShellGPT4.exe
Resource
win10v2004-20231222-en
General
-
Target
ShellGPT4.exe
-
Size
4.0MB
-
MD5
c62f737ce988b95d667ccfebcfcab323
-
SHA1
d5a5f8aca605097e98163dd3163c9519fe2d5b7d
-
SHA256
9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256
-
SHA512
d6fb67ffec3b2e1d0add413f715b6b27ae9c0c887f05a770e3e15984d11058796ebcdcc9840818f9484990ebfb75e8fef928d1f6812eef3e24cbbce70e86f977
-
SSDEEP
12288:fLplFN+msYJ2nCuWyEHx7YsvTZq7FUEpJBC:HC9WtZM
Malware Config
Extracted
marsstealer
Default
www.moscow-post.ru/bark/wpadmin/admin.php
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3260 4160 WerFault.exe 5F.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ShellGPT4.exe"C:\Users\Admin\AppData\Local\Temp\ShellGPT4.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\5F.exe"C:\Users\Admin\AppData\Local\Temp\5F.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 13683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4160 -ip 41601⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5F.exeFilesize
1KB
MD5d8269e266b1ab36676e4be1ad139de21
SHA167d26239b7a9499f43bc1a3ec58bcce6a68778d2
SHA256fca0b9aa3fd503ce703d0f3cd342555cc86a0650586850feba5bef89496f2d96
SHA5129fafe62e1b86af4e0a12bffb1d3372ea637a53cf4221ebd867fb91a86cd1a18db64d22707798096873fa0d8aee84fb69703b41c6336ba6bb827391d74ed97776
-
C:\Users\Admin\AppData\Local\Temp\5F.exeFilesize
18KB
MD5c88db39ac0652a6c66b40c5dce98c0b5
SHA10719b4bcc0b0af154b958304e0021e420eff755f
SHA256fbe514cb61fa2030221cfd654447e0e06ebb72aa6f16398fd65b3d4570d959e6
SHA51298cf10b1fa78d7b9db322498f005fe98cbd189209cb86b8ba1a206e0b07beb18395e6b5cc046d860732bcb0c51c83e0fc77c529ef2cdae20a43ff92ac62c3639
-
memory/4160-12-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4160-15-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/4500-1-0x0000000074D30000-0x00000000754E0000-memory.dmpFilesize
7.7MB
-
memory/4500-0-0x00000000005A0000-0x0000000000640000-memory.dmpFilesize
640KB
-
memory/4500-2-0x0000000004FA0000-0x0000000004FB0000-memory.dmpFilesize
64KB
-
memory/4500-13-0x0000000074D30000-0x00000000754E0000-memory.dmpFilesize
7.7MB