Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 21:21

General

  • Target

    5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe

  • Size

    1.0MB

  • MD5

    588fe99f2631db84a27bbfceca342f8c

  • SHA1

    84349b654c2f549d85dff6c3a548c7e11f79a5e3

  • SHA256

    5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a

  • SHA512

    d00d71d1d1bb8699727914a39190414f332c5be706f66b39ad1b1b8044c2ee7aec17511d784c864660c4c5230d51f69fc577b79ddc37d4c453a66f0bb25d9dfd

  • SSDEEP

    12288:Me/cwY1icfinL+r3FI4PpJEtpnxnI+UejPFnOVy/:/YTr1IDtpnv9P

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Mars Stealer

    An infostealer written in C++ based on other infostealers.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe
    "C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Roaming\Adobe\PIRN0EKP.exe
      "C:\Users\Admin\AppData\Roaming\Adobe\PIRN0EKP.exe"
      2⤵
      • Executes dropped EXE
      PID:3500

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\PIRN0EKP.exe
    Filesize

    159KB

    MD5

    3f2f75660ddca3660f254222ec2e54d9

    SHA1

    9e5710c00fc26b4d26d95c644040f56b652708b0

    SHA256

    ffe8a2116f63f9d5cdb408f3d1e8f476ea595b7323bc95808e33b45084f2e14f

    SHA512

    fee657800f455a2026a5ba4fb7e424bf52e77d1922c91fadd2f5a4284269eaa93c860065da13a439ea6c79ea855ecc58b99b9a293b6e64e91cc2dffd5ef92bbd

  • memory/1708-0-0x0000000074800000-0x0000000074FB0000-memory.dmp
    Filesize

    7.7MB

  • memory/1708-1-0x0000000000360000-0x00000000003D6000-memory.dmp
    Filesize

    472KB

  • memory/1708-2-0x0000000005340000-0x00000000058E4000-memory.dmp
    Filesize

    5.6MB

  • memory/1708-12-0x0000000074800000-0x0000000074FB0000-memory.dmp
    Filesize

    7.7MB

  • memory/3500-11-0x0000000000400000-0x000000000043D000-memory.dmp
    Filesize

    244KB