Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 15:52
Static task
static1
Behavioral task
behavioral1
Sample
099d81985b4d1951c9a0448bdead2e31.exe
Resource
win7-20240221-en
General
-
Target
099d81985b4d1951c9a0448bdead2e31.exe
-
Size
283KB
-
MD5
099d81985b4d1951c9a0448bdead2e31
-
SHA1
3707f6971ecdd856999ca980a1b99b551bea5ff9
-
SHA256
291e511eb00d5f658d345115de7fbd13e416e353bee19cdac8709b0b856da095
-
SHA512
f0a2f1c2542c3f898add88c6505a2fde764c5ff00835fee62ef0fe9523706d9dd617f539e80235c6307fe2af2440cb104465af1f9053dfb3743c2f675b1e71b2
-
SSDEEP
3072:vv+9poCcgDWpy3H/WIcF2MurGmzU0RNAjNYn8m6xRIDBtH6fzODM:nVCceW83OLuJ165xRSaG
Malware Config
Extracted
stealc
http://185.172.128.145
-
url_path
/3cd2b41cbde8fc9c.php
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 2020 099d81985b4d1951c9a0448bdead2e31.exe 2020 099d81985b4d1951c9a0448bdead2e31.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 099d81985b4d1951c9a0448bdead2e31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 099d81985b4d1951c9a0448bdead2e31.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2020 099d81985b4d1951c9a0448bdead2e31.exe 2020 099d81985b4d1951c9a0448bdead2e31.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
256KB
MD58f2318356b5eb6ba97f7a117f1a4562f
SHA1be2464cb96b2b83341c9d9fef7393593a0fa6ec5
SHA25628a5a93b18df96fc42f56176e1363f187e75580a5f197b681c4f71f5e92b10ed
SHA512a0015f0e1d12d073c98090a9b3d678ad9d8f04872475cf32ed84b163022206391b295c1bb16ff7e85d5bfaae330a19a797dc0aede5bbb2c18185aca65bd721a9