Analysis Overview
SHA256
724d6bc716544962bc5a964381e3ba5689c50e28ebd4fb3fb59a3b8ae1111952
Threat Level: Known bad
The file 588fe99f2631db84a27bbfceca342f8c.bin was found to be: Known bad.
Malicious Activity Summary
Mars Stealer
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Unsigned PE
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-04-18 01:22
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-18 01:22
Reported
2024-04-18 01:25
Platform
win7-20240220-en
Max time kernel
142s
Max time network
142s
Command Line
Signatures
Mars Stealer
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Adobe\SJ89U4U1.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2184 wrote to memory of 2352 | N/A | C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe | C:\Users\Admin\AppData\Roaming\Adobe\SJ89U4U1.exe |
| PID 2184 wrote to memory of 2352 | N/A | C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe | C:\Users\Admin\AppData\Roaming\Adobe\SJ89U4U1.exe |
| PID 2184 wrote to memory of 2352 | N/A | C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe | C:\Users\Admin\AppData\Roaming\Adobe\SJ89U4U1.exe |
| PID 2184 wrote to memory of 2352 | N/A | C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe | C:\Users\Admin\AppData\Roaming\Adobe\SJ89U4U1.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe
"C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe"
C:\Users\Admin\AppData\Roaming\Adobe\SJ89U4U1.exe
"C:\Users\Admin\AppData\Roaming\Adobe\SJ89U4U1.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | kenesrakishev.net | udp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
Files
memory/2184-0-0x0000000000FB0000-0x0000000001026000-memory.dmp
memory/2184-1-0x0000000074D50000-0x000000007543E000-memory.dmp
\Users\Admin\AppData\Roaming\Adobe\SJ89U4U1.exe
| MD5 | 3f2f75660ddca3660f254222ec2e54d9 |
| SHA1 | 9e5710c00fc26b4d26d95c644040f56b652708b0 |
| SHA256 | ffe8a2116f63f9d5cdb408f3d1e8f476ea595b7323bc95808e33b45084f2e14f |
| SHA512 | fee657800f455a2026a5ba4fb7e424bf52e77d1922c91fadd2f5a4284269eaa93c860065da13a439ea6c79ea855ecc58b99b9a293b6e64e91cc2dffd5ef92bbd |
memory/2184-11-0x00000000006B0000-0x00000000006ED000-memory.dmp
memory/2184-12-0x00000000006B0000-0x00000000006ED000-memory.dmp
memory/2352-13-0x0000000000400000-0x000000000043D000-memory.dmp
memory/2184-14-0x0000000074D50000-0x000000007543E000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-18 01:22
Reported
2024-04-18 01:25
Platform
win10v2004-20240412-en
Max time kernel
119s
Max time network
136s
Command Line
Signatures
Mars Stealer
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\HQUU7B0V.exe | N/A |
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe
"C:\Users\Admin\AppData\Local\Temp\5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe"
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\HQUU7B0V.exe
"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\HQUU7B0V.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 25.24.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 156.33.209.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.114.53.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | kenesrakishev.net | udp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.121.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.24.18.2.in-addr.arpa | udp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 173.201.180.75:80 | kenesrakishev.net | tcp |
Files
memory/3640-1-0x0000000075120000-0x00000000758D0000-memory.dmp
memory/3640-0-0x0000000000750000-0x00000000007C6000-memory.dmp
memory/3640-2-0x0000000005680000-0x0000000005C24000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\HQUU7B0V.exe
| MD5 | 3f2f75660ddca3660f254222ec2e54d9 |
| SHA1 | 9e5710c00fc26b4d26d95c644040f56b652708b0 |
| SHA256 | ffe8a2116f63f9d5cdb408f3d1e8f476ea595b7323bc95808e33b45084f2e14f |
| SHA512 | fee657800f455a2026a5ba4fb7e424bf52e77d1922c91fadd2f5a4284269eaa93c860065da13a439ea6c79ea855ecc58b99b9a293b6e64e91cc2dffd5ef92bbd |
memory/2664-11-0x0000000000400000-0x000000000043D000-memory.dmp
memory/3640-12-0x0000000005190000-0x0000000005222000-memory.dmp
memory/3640-14-0x0000000075120000-0x00000000758D0000-memory.dmp