Analysis
-
max time kernel
171s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 17:18
Behavioral task
behavioral1
Sample
033362225cf09b9ae543da265c7d1885.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
033362225cf09b9ae543da265c7d1885.exe
Resource
win10v2004-20231215-en
General
-
Target
033362225cf09b9ae543da265c7d1885.exe
-
Size
3.4MB
-
MD5
033362225cf09b9ae543da265c7d1885
-
SHA1
4d2b95b71dd92277718b54a341ba62b24c95c888
-
SHA256
9388288b3a18d968cd47446d545eb63d272bac65c0ad1d490beb389d94d2e9e0
-
SHA512
41b858735f309c938db681cd1a974dd47c7ff0fe3286f713ce50d4c7e070e64af26dd9a2dfe59f7a559d4255557d0926406c66996edb819ab466f4527349543e
-
SSDEEP
98304:UVrHzZ9ACjcIOrJkqn7lAmpe+oO8XuhAAe9tSys3mm:UVDzZCkcI66qn7lAmlobXuO9tSvf
Malware Config
Signatures
-
Darkstealer
Darkstealer is a file grabber, data stealer, and RAT.
-
Detects Echelon Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2324-25-0x0000000000BE0000-0x0000000001528000-memory.dmp family_echelon behavioral2/memory/2324-26-0x0000000000BE0000-0x0000000001528000-memory.dmp family_echelon -
Echelon - DarkStealer Fork 2 IoCs
Payload resembles modified variant of Echelon Stealer called DarkStealer.
Processes:
resource yara_rule behavioral2/memory/2324-25-0x0000000000BE0000-0x0000000001528000-memory.dmp echelon_darkstealer behavioral2/memory/2324-26-0x0000000000BE0000-0x0000000001528000-memory.dmp echelon_darkstealer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
033362225cf09b9ae543da265c7d1885.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 033362225cf09b9ae543da265c7d1885.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
033362225cf09b9ae543da265c7d1885.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 033362225cf09b9ae543da265c7d1885.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 033362225cf09b9ae543da265c7d1885.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2324-25-0x0000000000BE0000-0x0000000001528000-memory.dmp themida behavioral2/memory/2324-26-0x0000000000BE0000-0x0000000001528000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
033362225cf09b9ae543da265c7d1885.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 033362225cf09b9ae543da265c7d1885.exe Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 033362225cf09b9ae543da265c7d1885.exe Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 033362225cf09b9ae543da265c7d1885.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
033362225cf09b9ae543da265c7d1885.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 033362225cf09b9ae543da265c7d1885.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
033362225cf09b9ae543da265c7d1885.exepid Process 2324 033362225cf09b9ae543da265c7d1885.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 1712 2324 WerFault.exe 90 4056 2324 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
033362225cf09b9ae543da265c7d1885.exepid Process 2324 033362225cf09b9ae543da265c7d1885.exe 2324 033362225cf09b9ae543da265c7d1885.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
033362225cf09b9ae543da265c7d1885.exedescription pid Process Token: SeDebugPrivilege 2324 033362225cf09b9ae543da265c7d1885.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
033362225cf09b9ae543da265c7d1885.exedescription pid Process procid_target PID 2324 wrote to memory of 1712 2324 033362225cf09b9ae543da265c7d1885.exe 107 PID 2324 wrote to memory of 1712 2324 033362225cf09b9ae543da265c7d1885.exe 107 PID 2324 wrote to memory of 1712 2324 033362225cf09b9ae543da265c7d1885.exe 107 -
outlook_office_path 1 IoCs
Processes:
033362225cf09b9ae543da265c7d1885.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 033362225cf09b9ae543da265c7d1885.exe -
outlook_win_path 1 IoCs
Processes:
033362225cf09b9ae543da265c7d1885.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 033362225cf09b9ae543da265c7d1885.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\033362225cf09b9ae543da265c7d1885.exe"C:\Users\Admin\AppData\Local\Temp\033362225cf09b9ae543da265c7d1885.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Accesses Microsoft Outlook profiles
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 22122⤵
- Program crash
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 22122⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2324 -ip 23241⤵PID:1472