Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1.exe
Resource
win10v2004-20240226-en
General
-
Target
0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1.exe
-
Size
6.8MB
-
MD5
9df2be3860081eb963d028592fb998f6
-
SHA1
9e93f1f4201ceba6cf7346856acda50fe50bed15
-
SHA256
0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1
-
SHA512
a3bee2c1825fae431c8a3d547cfbf927628a5ef9f7570ffa277c72bc4368dbebc3ae9a3b3af6401e85c70d62d91bd58524030f75ccaabb080ea2b75ea663a936
-
SSDEEP
12288:StZqbqjCnunwzLipJX3MJxOWM+XnYd3RrnADA+uom/YeBL:StDwUJ8SpoE/YeBL
Malware Config
Extracted
marsstealer
Default
kenesrakishev.net/wp-includes/pomo/po.php
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1.exe -
Executes dropped EXE 1 IoCs
Processes:
2.exepid process 2944 2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2488 2944 WerFault.exe 2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1.exedescription pid process target process PID 4256 wrote to memory of 2944 4256 0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1.exe 2.exe PID 4256 wrote to memory of 2944 4256 0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1.exe 2.exe PID 4256 wrote to memory of 2944 4256 0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1.exe 2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1.exe"C:\Users\Admin\AppData\Local\Temp\0ea66c4bb51415da1cd18fb935dbf3f5e8cf671310b9fa9a1f847fdcb6cc46b1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\ProgramData\2.exe"C:\ProgramData\2.exe"2⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 17763⤵
- Program crash
PID:2488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2944 -ip 29441⤵PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD5ad89890757c177d7d05e2fbea0547772
SHA1da871536caff869ea4a35f351b2fb90c6645b555
SHA2561109fc5e54190e0b50cdc3c455af86887566968cdfb6df59c2bfb566ddb295af
SHA512829584a81473350e2ace4a9ca1f25e3b63e2f7d376e0ff30846f97c91d805df35ff251431956d932d16f60e42846702ae8e53dea6f4bf2175d860983008eed49