Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 02:15
Static task
static1
Behavioral task
behavioral1
Sample
9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exe
Resource
win10v2004-20231215-en
General
-
Target
9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exe
-
Size
4.0MB
-
MD5
c62f737ce988b95d667ccfebcfcab323
-
SHA1
d5a5f8aca605097e98163dd3163c9519fe2d5b7d
-
SHA256
9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256
-
SHA512
d6fb67ffec3b2e1d0add413f715b6b27ae9c0c887f05a770e3e15984d11058796ebcdcc9840818f9484990ebfb75e8fef928d1f6812eef3e24cbbce70e86f977
-
SSDEEP
12288:fLplFN+msYJ2nCuWyEHx7YsvTZq7FUEpJBC:HC9WtZM
Malware Config
Extracted
marsstealer
Default
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Executes dropped EXE 1 IoCs
Processes:
ZDBU5HP.exepid process 2264 ZDBU5HP.exe -
Loads dropped DLL 5 IoCs
Processes:
9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exeWerFault.exepid process 2004 9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exe 2004 9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2816 2264 WerFault.exe ZDBU5HP.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exeZDBU5HP.exedescription pid process target process PID 2004 wrote to memory of 2264 2004 9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exe ZDBU5HP.exe PID 2004 wrote to memory of 2264 2004 9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exe ZDBU5HP.exe PID 2004 wrote to memory of 2264 2004 9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exe ZDBU5HP.exe PID 2004 wrote to memory of 2264 2004 9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exe ZDBU5HP.exe PID 2264 wrote to memory of 2816 2264 ZDBU5HP.exe WerFault.exe PID 2264 wrote to memory of 2816 2264 ZDBU5HP.exe WerFault.exe PID 2264 wrote to memory of 2816 2264 ZDBU5HP.exe WerFault.exe PID 2264 wrote to memory of 2816 2264 ZDBU5HP.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exe"C:\Users\Admin\AppData\Local\Temp\9fba2c6f51319bc7585cd88948dfe4198a73a95d460d20f7c4ce54f892f84256.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\ZDBU5HP.exe"C:\Users\Admin\AppData\Local\Temp\ZDBU5HP.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 4283⤵
- Loads dropped DLL
- Program crash
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD5cb931b2b653c327a20844180e26675de
SHA13e9186e83b682a167d12acb556b544a029059d80
SHA256d638138809368db6e11149bddef9b835063c26f4b7d657ef1f8da7aec2042d63
SHA5129c68708ee543199b9d8ed809d69e4394fad5dfdcb324e70b9c2559985dffa3d487d0b8d98af647d871bce1ed47617b7e588f78fc2778641dd461e5dc7a442f32