Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/04/2024, 01:03 UTC

General

  • Target

    17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe

  • Size

    8.8MB

  • MD5

    979d0840f1018723a0c2f1b38e053a87

  • SHA1

    bc00bc18122b597d5484d05f6f1df694fa9f9f64

  • SHA256

    17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744

  • SHA512

    2f6c2f764e0a9e057c25e32911721f47872e76b2cb9320342b7c221d088dab95806fc2d4499fa4151a508dc3a6fc35966d55410b6d53851cc1a382ad7c775729

  • SSDEEP

    12288:u7WDZ2e76xWryJabHBAWAzADGBUghdvfKKmWe4b3hZ1I/p1LBaYXK:V8IKLJZZ1I/pu

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Mars Stealer

    An infostealer written in C++ based on other infostealers.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe
    "C:\Users\Admin\AppData\Local\Temp\17ad92c5d4b0707380de23f0dc97a7d50319d3f332be6a6d9cf30d239d49f744.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Roaming\Identities\OLS.exe
      "C:\Users\Admin\AppData\Roaming\Identities\OLS.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 1408
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2784

Network

  • flag-us
    DNS
    kenesrakishev.net
    OLS.exe
    Remote address:
    8.8.8.8:53
    Request
    kenesrakishev.net
    IN A
    Response
    kenesrakishev.net
    IN A
    173.201.180.75
  • flag-us
    GET
    http://kenesrakishev.net/wp-includes/pomo/po.php
    OLS.exe
    Remote address:
    173.201.180.75:80
    Request
    GET /wp-includes/pomo/po.php HTTP/1.1
    Host: kenesrakishev.net
    Connection: Keep-Alive
    Cache-Control: no-cache
    Response
    HTTP/1.1 301 Moved Permanently
    Date: Sun, 07 Apr 2024 01:04:28 GMT
    Server: Apache
    Location: https://kenesrakishev.net/wp-includes/pomo/po.php
    Content-Length: 257
    Keep-Alive: timeout=5
    Connection: Keep-Alive
    Content-Type: text/html; charset=iso-8859-1
  • flag-us
    GET
    http://kenesrakishev.net/request
    OLS.exe
    Remote address:
    173.201.180.75:80
    Request
    GET /request HTTP/1.1
    Host: kenesrakishev.net
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Sun, 07 Apr 2024 01:04:30 GMT
    Server: Apache
    Vary: Accept-Encoding,Cookie
    Expires: Wed, 11 Jan 1984 05:00:00 GMT
    Cache-Control: no-cache, must-revalidate, max-age=0
    Link: <https://kenesrakishev.net/wp-json/>; rel="https://api.w.org/"
    Transfer-Encoding: chunked
    Content-Type: text/html; charset=UTF-8
  • flag-us
    GET
    https://kenesrakishev.net/wp-includes/pomo/po.php
    OLS.exe
    Remote address:
    173.201.180.75:443
    Request
    GET /wp-includes/pomo/po.php HTTP/1.1
    Connection: Keep-Alive
    Cache-Control: no-cache
    Host: kenesrakishev.net
    Response
    HTTP/1.1 200 OK
    Date: Sun, 07 Apr 2024 01:04:29 GMT
    Server: Apache
    Upgrade: h2,h2c
    Connection: Upgrade, Keep-Alive
    Vary: Accept-Encoding
    Content-Length: 0
    Keep-Alive: timeout=5
    Content-Type: text/html; charset=UTF-8
  • 173.201.180.75:80
    http://kenesrakishev.net/request
    http
    OLS.exe
    5.5kB
    285.4kB
    116
    212

    HTTP Request

    GET http://kenesrakishev.net/wp-includes/pomo/po.php

    HTTP Response

    301

    HTTP Request

    GET http://kenesrakishev.net/request

    HTTP Response

    404
  • 173.201.180.75:443
    https://kenesrakishev.net/wp-includes/pomo/po.php
    tls, http
    OLS.exe
    917 B
    4.0kB
    9
    9

    HTTP Request

    GET https://kenesrakishev.net/wp-includes/pomo/po.php

    HTTP Response

    200
  • 8.8.8.8:53
    kenesrakishev.net
    dns
    OLS.exe
    63 B
    79 B
    1
    1

    DNS Request

    kenesrakishev.net

    DNS Response

    173.201.180.75

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Identities\OLS.exe

    Filesize

    159KB

    MD5

    f07befa95b54aa2cd90cfbbfdb9d0942

    SHA1

    91c44a024b214e656c4279d1223a7beffeef129f

    SHA256

    d9f52689efae410865d403b2707f5319b99c2985aed876254141fa7a7699e7e3

    SHA512

    a8b5daf2b7d0b3cec0841953c00e9a58a08373af844ebaf37ada66a260dad9002fb99edb0673388cb9a5544a2908faab09d544cf5099554303cc2da9f4de46b6

  • memory/2152-0-0x0000000000F40000-0x0000000000FE2000-memory.dmp

    Filesize

    648KB

  • memory/2152-1-0x00000000749F0000-0x00000000750DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2152-2-0x0000000004E30000-0x0000000004E70000-memory.dmp

    Filesize

    256KB

  • memory/2152-11-0x0000000000B60000-0x0000000000B9D000-memory.dmp

    Filesize

    244KB

  • memory/2152-14-0x00000000749F0000-0x00000000750DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2152-15-0x0000000000B60000-0x0000000000B9D000-memory.dmp

    Filesize

    244KB

  • memory/2172-13-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.