Malware Analysis Report

2024-08-06 14:52

Sample ID 240416-z8f8xsda23
Target 8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3.exe
SHA256 8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3
Tags
marsstealer default stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3

Threat Level: Known bad

The file 8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3.exe was found to be: Known bad.

Malicious Activity Summary

marsstealer default stealer

Mars Stealer

Executes dropped EXE

Loads dropped DLL

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-16 21:23

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-16 21:23

Reported

2024-04-16 21:25

Platform

win7-20240221-en

Max time kernel

142s

Max time network

143s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3.exe

"C:\Users\Admin\AppData\Local\Temp\8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3.exe"

C:\Users\Admin\AppData\Roaming\Identities\O2PE4ABX.exe

"C:\Users\Admin\AppData\Roaming\Identities\O2PE4ABX.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 kenesrakishev.net udp
US 173.201.180.75:80 kenesrakishev.net tcp
US 173.201.180.75:80 kenesrakishev.net tcp
US 173.201.180.75:80 kenesrakishev.net tcp

Files

memory/2012-1-0x0000000074BF0000-0x00000000752DE000-memory.dmp

memory/2012-0-0x0000000001160000-0x00000000011D6000-memory.dmp

\Users\Admin\AppData\Roaming\Identities\O2PE4ABX.exe

MD5 e4cb1bcdc60f4f2fcdaa6a68c8493a5f
SHA1 bfd7d3a86c2c99c0954f9091efc406d11c98131b
SHA256 757398277a44e255c9fc26eb7ebb77aa4b3997a4894ac785e74bea591c053979
SHA512 86581c1886d555350241a7cdd30a726700f1d8d65a852a3cc4fde332aad3f33361dbb93e570f7ae724501ff46fd5c8447852ba4bb707a74993025e1cfabf6219

memory/2012-10-0x0000000000D70000-0x0000000000DAD000-memory.dmp

memory/2012-12-0x0000000000D70000-0x0000000000DAD000-memory.dmp

memory/1984-13-0x0000000000400000-0x000000000043D000-memory.dmp

memory/2012-14-0x0000000074BF0000-0x00000000752DE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-16 21:23

Reported

2024-04-16 21:25

Platform

win10v2004-20240412-en

Max time kernel

128s

Max time network

162s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3.exe"

Signatures

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3.exe

"C:\Users\Admin\AppData\Local\Temp\8996579058ec9c3a04bd2496bd1807da60fb38c2ed8408c626c5686119cdc8e3.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 87.126.19.2.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 11.179.89.13.in-addr.arpa udp

Files

memory/2164-0-0x0000000000540000-0x00000000005B6000-memory.dmp

memory/2164-1-0x0000000074960000-0x0000000075110000-memory.dmp

memory/2164-2-0x0000000005450000-0x00000000059F4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Low\TC6CMQRT.exe

MD5 e4cb1bcdc60f4f2fcdaa6a68c8493a5f
SHA1 bfd7d3a86c2c99c0954f9091efc406d11c98131b
SHA256 757398277a44e255c9fc26eb7ebb77aa4b3997a4894ac785e74bea591c053979
SHA512 86581c1886d555350241a7cdd30a726700f1d8d65a852a3cc4fde332aad3f33361dbb93e570f7ae724501ff46fd5c8447852ba4bb707a74993025e1cfabf6219

memory/2164-8-0x0000000074960000-0x0000000075110000-memory.dmp