Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b.exe
Resource
win10v2004-20240226-en
General
-
Target
9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b.exe
-
Size
614KB
-
MD5
a74c9036ba18a91d23733f21f0965352
-
SHA1
f39eb55e6fc74d112e7e3b8f72053cf139f1f6d1
-
SHA256
9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b
-
SHA512
1cfaed9b4ba552e70f035b326e49b003afc46b4cdfe872a729d6359d835d37864187994815f9a2e18be794888475553648bf4b2f1a6e8b96f64d9bd1691d034f
-
SSDEEP
12288:6jLIHe+qdOqQ/H6OKnA5feEq8sdvuxi+vC/tKJ+2BAMSsjgZeS1I/XUta93poy:CRtwtvagbCy
Malware Config
Extracted
marsstealer
Default
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Executes dropped EXE 1 IoCs
pid Process 2712 4DX9RJE7SLSUZX.exe -
Loads dropped DLL 5 IoCs
pid Process 1932 9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b.exe 1932 9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b.exe 2652 WerFault.exe 2652 WerFault.exe 2652 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2652 2712 WerFault.exe 28 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 4DX9RJE7SLSUZX.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 4DX9RJE7SLSUZX.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2712 1932 9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b.exe 28 PID 1932 wrote to memory of 2712 1932 9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b.exe 28 PID 1932 wrote to memory of 2712 1932 9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b.exe 28 PID 1932 wrote to memory of 2712 1932 9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b.exe 28 PID 2712 wrote to memory of 2652 2712 4DX9RJE7SLSUZX.exe 31 PID 2712 wrote to memory of 2652 2712 4DX9RJE7SLSUZX.exe 31 PID 2712 wrote to memory of 2652 2712 4DX9RJE7SLSUZX.exe 31 PID 2712 wrote to memory of 2652 2712 4DX9RJE7SLSUZX.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b.exe"C:\Users\Admin\AppData\Local\Temp\9cc1d2cf5e3b394fbb7f4d470b6c4e094aa8691fc759f9f75faa88a5772c882b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\ProgramData\4DX9RJE7SLSUZX.exe"C:\ProgramData\4DX9RJE7SLSUZX.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 6323⤵
- Loads dropped DLL
- Program crash
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD514878fb96760ba869271109d832f43a7
SHA1874f6bcac3ef5682a567483ea5627d38bfbffa8d
SHA2560c816842e7a1649f0010b7c437a7783f82fd8a62a080adaeaecd871e6578c721
SHA512f882cfb373f79e823e3284b6dbe09d7df0ea90d0ab20e9399e1ee3af86eec2e8ba5c3b882f6b7f88b0478bc3fdfe05e033ee6fcbc2813faf13558fbec1d0a2e2