Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe
Resource
win10v2004-20240226-en
General
-
Target
5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe
-
Size
14.5MB
-
MD5
1dba954b14bc941c13917462e368c560
-
SHA1
ab9eaf52b10a9d270ba0776087456f55ca10c447
-
SHA256
5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396
-
SHA512
e952f7d9fdfc63233ed2592251c68d6bb631b80d586a8349731f858e8c4dca266a91c4db2a042df2accdab30044d3f4b5a3517d0ec1f130080609007ef268167
-
SSDEEP
12288:Mi2f75WQGH5Tua5O7g8+V9rI0djHf1lwNfUNq71j8/37vXu:V8YZO2j3I0dP7P
Malware Config
Extracted
marsstealer
Default
kenesrakishev.net/wp-includes/pomo/po.php
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe -
Executes dropped EXE 1 IoCs
pid Process 4976 FQ4FMPEQL69.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4848 4976 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2324 wrote to memory of 4976 2324 5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe 89 PID 2324 wrote to memory of 4976 2324 5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe 89 PID 2324 wrote to memory of 4976 2324 5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe"C:\Users\Admin\AppData\Local\Temp\5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\ProgramData\FQ4FMPEQL69.exe"C:\ProgramData\FQ4FMPEQL69.exe"2⤵
- Executes dropped EXE
PID:4976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 17603⤵
- Program crash
PID:4848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4976 -ip 49761⤵PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD51a9fa43be1579005d913413d18f047b7
SHA1a92faa80014713989cd2c527d0bc7dd0991d90a4
SHA25630a9559298fd9d27a75bd6b5a73b762ac997992f677a0081d7fb87b74c00eff1
SHA512e52d2f06d9a424e0ded2943e43d07e8ac40ee85f8cb10c90d88abf7482046f38c2d8580055cf211094f1274c930061c889480ffade363cf1b6eee57def259dbd