Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-04-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
bffaf04a07c5a17c84a85703e49b7813489593db84d9c8147d2279e5414471dd.exe
Resource
win10v2004-20240412-en
General
-
Target
bffaf04a07c5a17c84a85703e49b7813489593db84d9c8147d2279e5414471dd.exe
-
Size
497KB
-
MD5
05121c54247f7a8bbebdfeecd2a1ae4e
-
SHA1
d2131395bfbe15b9a0fd99e89bda5ff348c1b195
-
SHA256
bffaf04a07c5a17c84a85703e49b7813489593db84d9c8147d2279e5414471dd
-
SHA512
af64644d96ad611194026c3b3d97cf61f62a3783a7fe62895d306f14a40d2c7458d586f03aca3b0fd028529b7db05de1c65b0189f516c61d21fa0800f07c93ab
-
SSDEEP
12288:80il6waZftf+ZTOHVkXXcA4KEd4SOoZaWHV4h6:80gSftfC0VirbSOoZaWHV4h6
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4536 uw8.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3548 4536 WerFault.exe 77 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1160 wrote to memory of 4536 1160 bffaf04a07c5a17c84a85703e49b7813489593db84d9c8147d2279e5414471dd.exe 77 PID 1160 wrote to memory of 4536 1160 bffaf04a07c5a17c84a85703e49b7813489593db84d9c8147d2279e5414471dd.exe 77 PID 1160 wrote to memory of 4536 1160 bffaf04a07c5a17c84a85703e49b7813489593db84d9c8147d2279e5414471dd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\bffaf04a07c5a17c84a85703e49b7813489593db84d9c8147d2279e5414471dd.exe"C:\Users\Admin\AppData\Local\Temp\bffaf04a07c5a17c84a85703e49b7813489593db84d9c8147d2279e5414471dd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\uw8.0.exe"C:\Users\Admin\AppData\Local\Temp\uw8.0.exe"2⤵
- Executes dropped EXE
PID:4536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 12403⤵
- Program crash
PID:3548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4536 -ip 45361⤵PID:3828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD580e2c398d0e2dfda0160adea3381b007
SHA11d1df0a55ee3447f9db99333a5f6b3a580277c22
SHA256f9bc672a380dfefae4bdb1df4132408f29344947bfede70c5c6129865f734d69
SHA51225c217adcd552776b60d01ba86e22def4e05ac8c43c791254df2def271d40c10782edef6dcfb6d0aa8251652912a3d31af9a8637cc2b1269229f28febe8e8697