Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-01-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe
Resource
win10v2004-20231215-en
General
-
Target
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe
-
Size
13.4MB
-
MD5
6e08d023664e3f4e835ec3ec198b883a
-
SHA1
43f2f3321a51f1ca308af891d2e1dbaaee48b045
-
SHA256
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad
-
SHA512
41d44ed76ecda43eab891a2e07cb43481478c39797e44ed017654a8bca346b90bfcf4f444532d8e9765173c2e9b26d5f524fe42ec9a7830230fedbe21f9e0ec1
-
SSDEEP
12288:bu5DqC9/n1D0jAV8eCeoIl1TroJMExsi+vakV7tbQ3KtwU:buDXVsUThTFyJm
Malware Config
Extracted
marsstealer
Default
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Executes dropped EXE 1 IoCs
pid Process 2384 41AKTQO.exe -
Loads dropped DLL 5 IoCs
pid Process 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2456 2384 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2384 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 1388 wrote to memory of 2384 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 1388 wrote to memory of 2384 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 1388 wrote to memory of 2384 1388 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 2384 wrote to memory of 2456 2384 41AKTQO.exe 31 PID 2384 wrote to memory of 2456 2384 41AKTQO.exe 31 PID 2384 wrote to memory of 2456 2384 41AKTQO.exe 31 PID 2384 wrote to memory of 2456 2384 41AKTQO.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe"C:\Users\Admin\AppData\Local\Temp\791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\41AKTQO.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\41AKTQO.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 8083⤵
- Loads dropped DLL
- Program crash
PID:2456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\41AKTQO.exe
Filesize159KB
MD5a103174262d8c3fd501ffb95323c60b1
SHA1e40f0dd566ba3d50886d3f9e82bf2c108370d62b
SHA256bc65e75fcfee4ff9655005f8496f7c86feb892f0caec33c2208e8381cb967248
SHA512a023dd3997474d427d963a23ccbe7091fdda53d8fde1e1c43eb2e67090a27bd1b0f9eee08757993125cfe10683c38ab0db2194a5847ff51e39d636357c381da2