Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 21:21

General

  • Target

    5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe

  • Size

    1.0MB

  • MD5

    588fe99f2631db84a27bbfceca342f8c

  • SHA1

    84349b654c2f549d85dff6c3a548c7e11f79a5e3

  • SHA256

    5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a

  • SHA512

    d00d71d1d1bb8699727914a39190414f332c5be706f66b39ad1b1b8044c2ee7aec17511d784c864660c4c5230d51f69fc577b79ddc37d4c453a66f0bb25d9dfd

  • SSDEEP

    12288:Me/cwY1icfinL+r3FI4PpJEtpnxnI+UejPFnOVy/:/YTr1IDtpnv9P

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Mars Stealer

    An infostealer written in C++ based on other infostealers.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe
    "C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\WPDNSE\0P1ZL2P0.exe
      "C:\Users\Admin\AppData\Local\Temp\WPDNSE\0P1ZL2P0.exe"
      2⤵
      • Executes dropped EXE
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\WPDNSE\0P1ZL2P0.exe

    Filesize

    159KB

    MD5

    3f2f75660ddca3660f254222ec2e54d9

    SHA1

    9e5710c00fc26b4d26d95c644040f56b652708b0

    SHA256

    ffe8a2116f63f9d5cdb408f3d1e8f476ea595b7323bc95808e33b45084f2e14f

    SHA512

    fee657800f455a2026a5ba4fb7e424bf52e77d1922c91fadd2f5a4284269eaa93c860065da13a439ea6c79ea855ecc58b99b9a293b6e64e91cc2dffd5ef92bbd

  • memory/1048-0-0x0000000000E70000-0x0000000000EE6000-memory.dmp

    Filesize

    472KB

  • memory/1048-1-0x0000000074840000-0x0000000074F2E000-memory.dmp

    Filesize

    6.9MB

  • memory/1048-11-0x0000000000B80000-0x0000000000BBD000-memory.dmp

    Filesize

    244KB

  • memory/1048-12-0x0000000000B80000-0x0000000000BBD000-memory.dmp

    Filesize

    244KB

  • memory/1048-14-0x0000000074840000-0x0000000074F2E000-memory.dmp

    Filesize

    6.9MB

  • memory/2584-13-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB