Analysis Overview
SHA256
cd6b323e455ad47f4b395e8ee8e9a921b5bc22d180f2e1dfcab964ed17857ad0
Threat Level: Known bad
The file b3605edf698023865b1e65852ff9e627.bin was found to be: Known bad.
Malicious Activity Summary
Mars Stealer
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Enumerates physical storage devices
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-04-18 01:45
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-18 01:45
Reported
2024-04-18 01:47
Platform
win7-20240221-en
Max time kernel
142s
Max time network
142s
Command Line
Signatures
Mars Stealer
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\04KK9IU6.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe
"C:\Users\Admin\AppData\Local\Temp\3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe"
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\04KK9IU6.exe
"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\04KK9IU6.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | kenesrakishev.net | udp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
Files
memory/2292-0-0x00000000009A0000-0x0000000000A16000-memory.dmp
memory/2292-1-0x0000000074430000-0x0000000074B1E000-memory.dmp
memory/2292-2-0x0000000004B40000-0x0000000004B80000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\04KK9IU6.exe
| MD5 | 00333d129e6ef188664819662a141476 |
| SHA1 | 41605ab3ceffff75a4abd29d2df0fe26bc7de8a1 |
| SHA256 | 82314104e7bccbced4fbe95a65273d88678b183e45f4fffa8abf2a4ee6a06ee7 |
| SHA512 | cb762a2b092fe00ce7c6b99816084dfd6d34d59dde8eb6ccad5f8c031f892f0a495fce7e8600e8fdcd3989f828813a06a5dc23feeb5f2ba7c8c649b9f0a8a150 |
memory/2292-12-0x0000000002100000-0x000000000213D000-memory.dmp
memory/2292-14-0x0000000074430000-0x0000000074B1E000-memory.dmp
memory/2128-15-0x0000000000400000-0x000000000043D000-memory.dmp
memory/2292-13-0x0000000002100000-0x000000000213D000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-18 01:45
Reported
2024-04-18 01:47
Platform
win10v2004-20240412-en
Max time kernel
119s
Max time network
141s
Command Line
Signatures
Mars Stealer
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Adobe\BY0.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4612 wrote to memory of 1616 | N/A | C:\Users\Admin\AppData\Local\Temp\3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe | C:\Users\Admin\AppData\Roaming\Adobe\BY0.exe |
| PID 4612 wrote to memory of 1616 | N/A | C:\Users\Admin\AppData\Local\Temp\3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe | C:\Users\Admin\AppData\Roaming\Adobe\BY0.exe |
| PID 4612 wrote to memory of 1616 | N/A | C:\Users\Admin\AppData\Local\Temp\3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe | C:\Users\Admin\AppData\Roaming\Adobe\BY0.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe
"C:\Users\Admin\AppData\Local\Temp\3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe"
C:\Users\Admin\AppData\Roaming\Adobe\BY0.exe
"C:\Users\Admin\AppData\Roaming\Adobe\BY0.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 72.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.24.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.114.53.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | kenesrakishev.net | udp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.179.15.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
Files
memory/4612-0-0x0000000000E30000-0x0000000000EA6000-memory.dmp
memory/4612-1-0x0000000075360000-0x0000000075B10000-memory.dmp
memory/4612-2-0x0000000005800000-0x0000000005810000-memory.dmp
C:\Users\Admin\AppData\Roaming\Adobe\BY0.exe
| MD5 | 00333d129e6ef188664819662a141476 |
| SHA1 | 41605ab3ceffff75a4abd29d2df0fe26bc7de8a1 |
| SHA256 | 82314104e7bccbced4fbe95a65273d88678b183e45f4fffa8abf2a4ee6a06ee7 |
| SHA512 | cb762a2b092fe00ce7c6b99816084dfd6d34d59dde8eb6ccad5f8c031f892f0a495fce7e8600e8fdcd3989f828813a06a5dc23feeb5f2ba7c8c649b9f0a8a150 |
memory/1616-11-0x0000000000400000-0x000000000043D000-memory.dmp
memory/4612-13-0x0000000075360000-0x0000000075B10000-memory.dmp