Analysis

  • max time kernel
    148s
  • max time network
    159s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18/04/2024, 19:16

General

  • Target

    a62d5acae7355991b2d967c2d77aa329b3a9fe234bf2616748aaaf14196966b7.exe

  • Size

    448KB

  • MD5

    655d0f0862e457c2875d8f0620db2cfa

  • SHA1

    19af0abd56db28a734e486900fcd68a235a251b3

  • SHA256

    a62d5acae7355991b2d967c2d77aa329b3a9fe234bf2616748aaaf14196966b7

  • SHA512

    befb7dbf0be18db82ab976e90021b90d05501b41d837e0e0f365753063dc9f0af0eaf73ae46d0ae80a3f9b1cad90a76a29b34c3b290dcb432e09c534c45e0f88

  • SSDEEP

    6144:cLCoDvHwuTMwpQMLtK/mi6UN0p3JdRd8QKoy27EL4:cOoTHw0NXBGLV0pHjyL4

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a62d5acae7355991b2d967c2d77aa329b3a9fe234bf2616748aaaf14196966b7.exe
    "C:\Users\Admin\AppData\Local\Temp\a62d5acae7355991b2d967c2d77aa329b3a9fe234bf2616748aaaf14196966b7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3916
    • C:\Users\Admin\AppData\Local\Temp\u30s.0.exe
      "C:\Users\Admin\AppData\Local\Temp\u30s.0.exe"
      2⤵
      • Executes dropped EXE
      PID:1088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 1120
        3⤵
        • Program crash
        PID:1388
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1088 -ip 1088
    1⤵
      PID:2504

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\u30s.0.exe

            Filesize

            306KB

            MD5

            9e7bd4e6b0220bbb8c4068a02939e692

            SHA1

            92b8c83e84d6823bf4cf5238f368c27e5243241d

            SHA256

            a547ce72c56e28616970d53b15e05cf4532a20384cae7a72b8428789a48028ef

            SHA512

            7c1a0dcdcbeb988679ad24cbef85bd0b3f6c6c41c8699d506be3a1d6b0542fff0f6ec85eb53fe98278f787cd108771e2d168e2a9080327706edc629c41f57522

          • memory/1088-13-0x0000000000A30000-0x0000000000B30000-memory.dmp

            Filesize

            1024KB

          • memory/1088-14-0x00000000009F0000-0x0000000000A17000-memory.dmp

            Filesize

            156KB

          • memory/1088-15-0x0000000000400000-0x000000000084E000-memory.dmp

            Filesize

            4.3MB

          • memory/1088-16-0x0000000000400000-0x000000000084E000-memory.dmp

            Filesize

            4.3MB

          • memory/3916-1-0x00000000009E0000-0x0000000000AE0000-memory.dmp

            Filesize

            1024KB

          • memory/3916-2-0x0000000002590000-0x00000000025FD000-memory.dmp

            Filesize

            436KB

          • memory/3916-3-0x0000000000400000-0x0000000000872000-memory.dmp

            Filesize

            4.4MB

          • memory/3916-17-0x0000000000400000-0x0000000000872000-memory.dmp

            Filesize

            4.4MB

          • memory/3916-19-0x00000000009E0000-0x0000000000AE0000-memory.dmp

            Filesize

            1024KB