Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2024 07:37

General

  • Target

    3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe

  • Size

    175KB

  • MD5

    2ff6ee1ef4ea7c63588e3c904e066cf4

  • SHA1

    85a5d659cdcdd358af7320a39dd129601b9e8c41

  • SHA256

    3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30

  • SHA512

    5d00ea2bbe6384e6f4375210f485b80e8109e4c578775d146423696ce8e6b4beac93d240df329ad443f0b03d13ec46cfdd06e80d52946f662263169fffdb6713

  • SSDEEP

    3072:NwLDaY5OIQfqCanVKeZccMBt1n/W77i5ftMwQx6TN45:uLDf5Yo3ZccMB3nAwQ7

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.24

Attributes
  • url_path

    /40d570f44e84a454.php

rc4.plain

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe
    "C:\Users\Admin\AppData\Local\Temp\3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe" & del "C:\ProgramData\*.dll"" & exit
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 5
        3⤵
        • Delays execution with timeout.exe
        PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\mozglue.dll

    Filesize

    399KB

    MD5

    ca7d772dbf6d7a0edff015ce4d324278

    SHA1

    80ab071da89e7cf93c969575400a96a70525f5ce

    SHA256

    57f899ab12e2a9ffa93bb83a0ebc8f507498948cd42d7354d7b5d1efbe93c6f2

    SHA512

    0d2f0cffac24d3d3c15cbb6038d2f1d350a55f10e52693c5c75d3fc3d420cf32f88cb68aced799d88281a8564bbf97308c51d0baeac44b84fa897c1b5a5e673a

  • \ProgramData\nss3.dll

    Filesize

    411KB

    MD5

    144294c493f25912b50f94091f396cce

    SHA1

    e467dfe03750e08fbbb4884d96459433e0530d68

    SHA256

    18f887d5fa55d539a240d49330fddf9555bfd788fabe0028e1cc20aacd058caf

    SHA512

    c421c7818b53754c626d092d112bdf4f9331efcae905e3dc4fdb328600a4db107e1513cdabbfee28132537ab1330fc4bc726c1a3d739958915de62a728f0135a

  • memory/2212-1-0x0000000000750000-0x0000000000850000-memory.dmp

    Filesize

    1024KB

  • memory/2212-2-0x0000000000220000-0x000000000023C000-memory.dmp

    Filesize

    112KB

  • memory/2212-3-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB

  • memory/2212-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp

    Filesize

    972KB

  • memory/2212-42-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB

  • memory/2212-64-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB

  • memory/2212-65-0x0000000000750000-0x0000000000850000-memory.dmp

    Filesize

    1024KB

  • memory/2212-72-0x0000000000750000-0x0000000000850000-memory.dmp

    Filesize

    1024KB

  • memory/2212-71-0x0000000000400000-0x000000000062E000-memory.dmp

    Filesize

    2.2MB