Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-01-2024 14:46
Static task
static1
Behavioral task
behavioral1
Sample
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe
Resource
win10v2004-20231215-en
General
-
Target
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe
-
Size
13.4MB
-
MD5
6e08d023664e3f4e835ec3ec198b883a
-
SHA1
43f2f3321a51f1ca308af891d2e1dbaaee48b045
-
SHA256
791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad
-
SHA512
41d44ed76ecda43eab891a2e07cb43481478c39797e44ed017654a8bca346b90bfcf4f444532d8e9765173c2e9b26d5f524fe42ec9a7830230fedbe21f9e0ec1
-
SSDEEP
12288:bu5DqC9/n1D0jAV8eCeoIl1TroJMExsi+vakV7tbQ3KtwU:buDXVsUThTFyJm
Malware Config
Extracted
marsstealer
Default
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Executes dropped EXE 1 IoCs
pid Process 2704 WM9.exe -
Loads dropped DLL 5 IoCs
pid Process 1692 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 1692 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 2344 WerFault.exe 2344 WerFault.exe 2344 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2344 2704 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2704 1692 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 1692 wrote to memory of 2704 1692 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 1692 wrote to memory of 2704 1692 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 1692 wrote to memory of 2704 1692 791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe 28 PID 2704 wrote to memory of 2344 2704 WM9.exe 31 PID 2704 wrote to memory of 2344 2704 WM9.exe 31 PID 2704 wrote to memory of 2344 2704 WM9.exe 31 PID 2704 wrote to memory of 2344 2704 WM9.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe"C:\Users\Admin\AppData\Local\Temp\791cb146ce71d27b52dd233a80f5ac4e63f69d49af07a53850954da93ff439ad.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\Identities\WM9.exe"C:\Users\Admin\AppData\Roaming\Identities\WM9.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 6403⤵
- Loads dropped DLL
- Program crash
PID:2344
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5f1fc5545364d92b7e003e4a402989943
SHA12ae504cf918e0cde083fa41ea786c45ae2013698
SHA256930e9e6e3d6f29fc42880cf774e91cf71dfa8923e5bd153d2030ed6f3eaa17aa
SHA5127f1bd065a94645f8f3850231e5885b3b85e26b7c553491819276b34491f4129d2890c9054dff53e8e24c2cdfffdc76923a1c088a4d64c0c9bc9b636c8178bb85
-
Filesize
71KB
MD5374dcd64ea822838dcf28164f0b8e305
SHA1b6958c80ffb9dfd98886c06f1da94b260589d922
SHA25605153ac01c78d299618fb63876f15b209de1906099288a4cb56aaa4bc051269a
SHA51205d130ace7aa635f91933bd2848d0985343d4a2984db85faadbe193bdbf3c30342e4b16f6a64f34c1328c5ef0866f2ed4612931b9b1005a265b6b319669e8d3c
-
Filesize
159KB
MD5a103174262d8c3fd501ffb95323c60b1
SHA1e40f0dd566ba3d50886d3f9e82bf2c108370d62b
SHA256bc65e75fcfee4ff9655005f8496f7c86feb892f0caec33c2208e8381cb967248
SHA512a023dd3997474d427d963a23ccbe7091fdda53d8fde1e1c43eb2e67090a27bd1b0f9eee08757993125cfe10683c38ab0db2194a5847ff51e39d636357c381da2
-
Filesize
69KB
MD5c6a70fc0f81d3ba137c1dab66904913e
SHA1ccf43c7cb9b410582b437556caf0aefde731f6d4
SHA2565e97f2816120962d138043f8b55cd522f290e37cac9f308de7211f714a71269d
SHA5120e1dfe9992030004516d7520605fce7e53980027132266b561c0129be2b7e088e1963da148f62c193db9f8854eb066132944aa694a02b990e93833becf42cd98
-
Filesize
92KB
MD554f80078ba88b264fc9355e63a5d9c16
SHA10e77d6d713e6224ad2c5afd9e5e99c4bf7a0ad20
SHA256de00ea8c2fd32543ef600267a7f3e5765645f1252c56158b7da467a825bee30b
SHA512b875682b72c1ae4c24f25e79145cc7969098f7adc1f5dd4138bc912a23147e298bb615213878a60707586930dc950f90d8958e1b3f7d9cc5fe972876d33e9503