Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 21:23

General

  • Target

    8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3.exe

  • Size

    3.4MB

  • MD5

    82132dee9a07a607146d757091782517

  • SHA1

    6b74a77a35f5e60d94541fdc49b63716d0224e46

  • SHA256

    8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3

  • SHA512

    4814c9e8a1c536c05abf72e0c83e58e2632a9b5a0248b295bb7752810634549d7191d152949bf7e433221b87c40858679c14cdaacb1f75b38ca4b97ff1a833b4

  • SSDEEP

    12288:hFyN37FMCwa/5zCoehaSiNM5JWFnOVyVI:jqADNqPC

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Mars Stealer

    An infostealer written in C++ based on other infostealers.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3.exe
    "C:\Users\Admin\AppData\Local\Temp\8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Roaming\Identities\O2PE4ABX.exe
      "C:\Users\Admin\AppData\Roaming\Identities\O2PE4ABX.exe"
      2⤵
      • Executes dropped EXE
      PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Identities\O2PE4ABX.exe

    Filesize

    159KB

    MD5

    e4cb1bcdc60f4f2fcdaa6a68c8493a5f

    SHA1

    bfd7d3a86c2c99c0954f9091efc406d11c98131b

    SHA256

    757398277a44e255c9fc26eb7ebb77aa4b3997a4894ac785e74bea591c053979

    SHA512

    86581c1886d555350241a7cdd30a726700f1d8d65a852a3cc4fde332aad3f33361dbb93e570f7ae724501ff46fd5c8447852ba4bb707a74993025e1cfabf6219

  • memory/1984-13-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2012-1-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB

  • memory/2012-0-0x0000000001160000-0x00000000011D6000-memory.dmp

    Filesize

    472KB

  • memory/2012-10-0x0000000000D70000-0x0000000000DAD000-memory.dmp

    Filesize

    244KB

  • memory/2012-12-0x0000000000D70000-0x0000000000DAD000-memory.dmp

    Filesize

    244KB

  • memory/2012-14-0x0000000074BF0000-0x00000000752DE000-memory.dmp

    Filesize

    6.9MB