Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/04/2024, 01:03 UTC
Static task
static1
Behavioral task
behavioral1
Sample
17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe
Resource
win10v2004-20240226-en
General
-
Target
17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe
-
Size
8.8MB
-
MD5
979d0840f1018723a0c2f1b38e053a87
-
SHA1
bc00bc18122b597d5484d05f6f1df694fa9f9f64
-
SHA256
17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744
-
SHA512
2f6c2f764e0a9e057c25e32911721f47872e76b2cb9320342b7c221d088dab95806fc2d4499fa4151a508dc3a6fc35966d55410b6d53851cc1a382ad7c775729
-
SSDEEP
12288:u7WDZ2e76xWryJabHBAWAzADGBUghdvfKKmWe4b3hZ1I/p1LBaYXK:V8IKLJZZ1I/pu
Malware Config
Extracted
marsstealer
Default
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Executes dropped EXE 1 IoCs
pid Process 2172 OLS.exe -
Loads dropped DLL 5 IoCs
pid Process 2152 17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe 2152 17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2784 2172 WerFault.exe 28 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 OLS.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 OLS.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2172 2152 17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe 28 PID 2152 wrote to memory of 2172 2152 17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe 28 PID 2152 wrote to memory of 2172 2152 17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe 28 PID 2152 wrote to memory of 2172 2152 17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe 28 PID 2172 wrote to memory of 2784 2172 OLS.exe 30 PID 2172 wrote to memory of 2784 2172 OLS.exe 30 PID 2172 wrote to memory of 2784 2172 OLS.exe 30 PID 2172 wrote to memory of 2784 2172 OLS.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe"C:\Users\Admin\AppData\Local\Temp\17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\Identities\OLS.exe"C:\Users\Admin\AppData\Roaming\Identities\OLS.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 14083⤵
- Loads dropped DLL
- Program crash
PID:2784
-
-
Network
-
Remote address:8.8.8.8:53Requestkenesrakishev.netIN AResponsekenesrakishev.netIN A173.201.180.75
-
Remote address:173.201.180.75:80RequestGET /wp-includes/pomo/po.php HTTP/1.1
Host: kenesrakishev.net
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 301 Moved Permanently
Server: Apache
Location: https://kenesrakishev.net/wp-includes/pomo/po.php
Content-Length: 257
Keep-Alive: timeout=5
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
-
Remote address:173.201.180.75:80RequestGET /request HTTP/1.1
Host: kenesrakishev.net
Cache-Control: no-cache
ResponseHTTP/1.1 404 Not Found
Server: Apache
Vary: Accept-Encoding,Cookie
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Link: <https://kenesrakishev.net/wp-json/>; rel="https://api.w.org/"
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
-
Remote address:173.201.180.75:443RequestGET /wp-includes/pomo/po.php HTTP/1.1
Connection: Keep-Alive
Cache-Control: no-cache
Host: kenesrakishev.net
ResponseHTTP/1.1 200 OK
Server: Apache
Upgrade: h2,h2c
Connection: Upgrade, Keep-Alive
Vary: Accept-Encoding
Content-Length: 0
Keep-Alive: timeout=5
Content-Type: text/html; charset=UTF-8
-
5.5kB 285.4kB 116 212
HTTP Request
GET http://kenesrakishev.net/wp-includes/pomo/po.phpHTTP Response
301HTTP Request
GET http://kenesrakishev.net/requestHTTP Response
404 -
917 B 4.0kB 9 9
HTTP Request
GET https://kenesrakishev.net/wp-includes/pomo/po.phpHTTP Response
200
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD5f07befa95b54aa2cd90cfbbfdb9d0942
SHA191c44a024b214e656c4279d1223a7beffeef129f
SHA256d9f52689efae410865d403b2707f5319b99c2985aed876254141fa7a7699e7e3
SHA512a8b5daf2b7d0b3cec0841953c00e9a58a08373af844ebaf37ada66a260dad9002fb99edb0673388cb9a5544a2908faab09d544cf5099554303cc2da9f4de46b6