Analysis

  • max time kernel
    18s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 20:31

General

  • Target

    8cbee06cc554d522b77c75779cc6ca51f52e77accbf492670c4677c3d6abb88e.exe

  • Size

    233KB

  • MD5

    498539e5c7b4be9f6354cabc638c949e

  • SHA1

    b860f271392caf8bbab962c2b5bff42eb65c2614

  • SHA256

    8cbee06cc554d522b77c75779cc6ca51f52e77accbf492670c4677c3d6abb88e

  • SHA512

    7248f4f5c867a543e3e3904bdf541420b60554b6b75a971f5b45b02538fa11f52b73170a19047aef07e406cf1f442fc111070a252918695c6b9a8d1099009825

  • SSDEEP

    3072:FFL3aa4+kEmpIJiWzt+/SOvaQJnKigKfjLE+QQujXXwI2RAr+7UzKoD:FFL3/fGuavVV3E+QVjrD

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Downloads MZ/PE file
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cbee06cc554d522b77c75779cc6ca51f52e77accbf492670c4677c3d6abb88e.exe
    "C:\Users\Admin\AppData\Local\Temp\8cbee06cc554d522b77c75779cc6ca51f52e77accbf492670c4677c3d6abb88e.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:3772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3772-2-0x0000000002380000-0x000000000239C000-memory.dmp

    Filesize

    112KB

  • memory/3772-3-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB

  • memory/3772-1-0x00000000009E0000-0x0000000000AE0000-memory.dmp

    Filesize

    1024KB

  • memory/3772-4-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB

  • memory/3772-5-0x0000000061E00000-0x0000000061EF3000-memory.dmp

    Filesize

    972KB

  • memory/3772-46-0x0000000002380000-0x000000000239C000-memory.dmp

    Filesize

    112KB

  • memory/3772-45-0x00000000009E0000-0x0000000000AE0000-memory.dmp

    Filesize

    1024KB

  • memory/3772-44-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB

  • memory/3772-52-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB

  • memory/3772-57-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB

  • memory/3772-61-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB

  • memory/3772-74-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB

  • memory/3772-79-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB