Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe
Resource
win10v2004-20240412-en
General
-
Target
5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe
-
Size
1.0MB
-
MD5
588fe99f2631db84a27bbfceca342f8c
-
SHA1
84349b654c2f549d85dff6c3a548c7e11f79a5e3
-
SHA256
5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a
-
SHA512
d00d71d1d1bb8699727914a39190414f332c5be706f66b39ad1b1b8044c2ee7aec17511d784c864660c4c5230d51f69fc577b79ddc37d4c453a66f0bb25d9dfd
-
SSDEEP
12288:Me/cwY1icfinL+r3FI4PpJEtpnxnI+UejPFnOVy/:/YTr1IDtpnv9P
Malware Config
Extracted
marsstealer
Default
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Executes dropped EXE 1 IoCs
Processes:
0P1ZL2P0.exepid process 2584 0P1ZL2P0.exe -
Loads dropped DLL 2 IoCs
Processes:
5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exepid process 1048 5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe 1048 5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exedescription pid process target process PID 1048 wrote to memory of 2584 1048 5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe 0P1ZL2P0.exe PID 1048 wrote to memory of 2584 1048 5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe 0P1ZL2P0.exe PID 1048 wrote to memory of 2584 1048 5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe 0P1ZL2P0.exe PID 1048 wrote to memory of 2584 1048 5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe 0P1ZL2P0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe"C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\WPDNSE\0P1ZL2P0.exe"C:\Users\Admin\AppData\Local\Temp\WPDNSE\0P1ZL2P0.exe"2⤵
- Executes dropped EXE
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD53f2f75660ddca3660f254222ec2e54d9
SHA19e5710c00fc26b4d26d95c644040f56b652708b0
SHA256ffe8a2116f63f9d5cdb408f3d1e8f476ea595b7323bc95808e33b45084f2e14f
SHA512fee657800f455a2026a5ba4fb7e424bf52e77d1922c91fadd2f5a4284269eaa93c860065da13a439ea6c79ea855ecc58b99b9a293b6e64e91cc2dffd5ef92bbd