Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-04-2024 18:04

General

  • Target

    136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe

  • Size

    414KB

  • MD5

    df1ecb1fc2d0480ef5a0e569543d14e9

  • SHA1

    8c90b5a6caab28b852cde352011752cb2761fdf9

  • SHA256

    136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499

  • SHA512

    4e8af41bdd90a6a2f2008be558041678608761703bbbd4f08a55ff1305464319bb96cbd53071c71f83a73ee6d1189a3a3aa3c91e69c3aae9626e3e209671aad4

  • SSDEEP

    6144:GaNowv7MR+dM+A4K3Kc8Y2Yem0IuONlLfiFtDgjTUGU6J54:GaNPv7Q+72K4eYrlLQDg0xo4

Score
10/10

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe
    "C:\Users\Admin\AppData\Local\Temp\136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3364
    • C:\Users\Admin\AppData\Local\Temp\u2lg.0.exe
      "C:\Users\Admin\AppData\Local\Temp\u2lg.0.exe"
      2⤵
      • Executes dropped EXE
      PID:4828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 1136
        3⤵
        • Program crash
        PID:2452
    • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe
      "C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4480
      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1848
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4192
    • C:\Users\Admin\AppData\Local\Temp\u2lg.1.exe
      "C:\Users\Admin\AppData\Local\Temp\u2lg.1.exe"
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3272
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 1724
      2⤵
      • Program crash
      PID:3684
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4828 -ip 4828
    1⤵
      PID:3904
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3364 -ip 3364
      1⤵
        PID:4332

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe

        Filesize

        7.6MB

        MD5

        862bf3003dca41d88ac49a6846149623

        SHA1

        b34f1d42dd0649d6b83f9a92124a554f48df0434

        SHA256

        50c10789db130a98c63e6e7f6e23b1c89b38c5ea4678f1e06fd1796fba25c75c

        SHA512

        fe5ab7888633dbfecca57ecd1732360796c2f19c62fc4282e2a92e9b8b440cc01e25b7a0c6a608cf9c2e9c9e3c49a8509a08851afcaef7e1afc21c0abcc2c969

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\WCLDll.dll

        Filesize

        590KB

        MD5

        63206e3b4f1fa4dcfbe1f2cc5d0c4e9d

        SHA1

        fe731b2e9c296d9ecc75ed96c2d29fe46c7cd924

        SHA256

        8f5b8645b5e5ea48acc411b21a1b3cd56d2660ac931989b9f064c8ff82039885

        SHA512

        32bdcce9e8e7f1ebe50e114f65f762391d52f482a112515ccb16b09653b93873528ea1a7473a2512075bf8f729997a65f455bf6599482e997b85e06a2f87f3d6

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\cosmetician.mpeg

        Filesize

        79KB

        MD5

        8e1bbc6d6c4d207393b59853f73945ae

        SHA1

        b66d632eae41267175bf5332d43a785dd929d79f

        SHA256

        b04725aaa99b27e04c02bec7d98fb4511331ea53761272325fff9c27a679e279

        SHA512

        1b45a7be00f54498df289641745ca6ee99e11d63100fb838b96c2d9412f8b5f0ea5aa8b964f32a4f9182cd599765f5ca08b91e8e8eecd06d1c53543284a59001

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\msvcp140.dll

        Filesize

        427KB

        MD5

        71a0aa2d05e9174cefd568347bd9c70f

        SHA1

        cb9247a0fa59e47f72df7d1752424b33a903bbb2

        SHA256

        fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47

        SHA512

        6e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe

        Filesize

        938KB

        MD5

        b15bac961f62448c872e1dc6d3931016

        SHA1

        1dcb61babb08fe5db711e379cb67335357a5db82

        SHA256

        bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5

        SHA512

        932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\quersprung.vhd

        Filesize

        1.3MB

        MD5

        3bee67dd0e04559c8fdc7761336dee47

        SHA1

        027ef9dca01fb928db79e57b418130165f06ed5f

        SHA256

        57745aba2885cf8bf770e7e9195697c05e35333417ca23af153367bf31cbf812

        SHA512

        35fb66f98a57b0d14c3044a91abac3e0670d516edfd691d6670df034e8454c550d3d2e702ab90cd32b70fcba8aeb2e02b7b3a07b6a340a932738968473f77dce

      • C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\vcruntime140.dll

        Filesize

        81KB

        MD5

        16b26bc43943531d7d7e379632ed4e63

        SHA1

        565287de39649e59e653a3612478c2186096d70a

        SHA256

        346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517

        SHA512

        b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc

      • C:\Users\Admin\AppData\Local\Temp\c099dd7e

        Filesize

        3.8MB

        MD5

        13418f74a7ce25cdd6997c9fcb718a0e

        SHA1

        f4c880821fee72c37c882b1e8ebf100efcafe31c

        SHA256

        a890935a36903669f35522c85c75e296404a4595453f060398cb64c5b0d6dfd0

        SHA512

        59017162877bbbdf823450a946e3e54e9130d8ebbf5baba24471c68a10d1fad3452be08c693cd7a78d0bf2fcfd6d3086edeec1a379f9b53fd66bb246c128d4c1

      • C:\Users\Admin\AppData\Local\Temp\da46906c

        Filesize

        1.4MB

        MD5

        7550914b27c5d17052c275f964728e14

        SHA1

        6280ba40d989f989adbaeed73e7bc29f7981d851

        SHA256

        301ad838897489119bfb484f549040664a049744d8d72a19760529420441be43

        SHA512

        d3f691f0838483f9cfdbc3162cfe88a6b967337ba9833b9b7070aeae854ad1a56c16cb5d889cff483649f7b5eee83f4f4a56d8d951fddf064cacf7df393f4b5f

      • C:\Users\Admin\AppData\Local\Temp\iolo\dm\ioloDMLog.txt

        Filesize

        2KB

        MD5

        d76d8cd8573d971433cc5196d46c9634

        SHA1

        3dcd5012c1c181d3c1a568581aa758b5dd41f659

        SHA256

        4756624503c2394c6163879a62171911f89f0d3f66f2ada8fe36c72519b036e5

        SHA512

        9fb38bb636e95048719538d6add9882f56caf66dfcd5bd9dafd59fee2c2ad3e04257fef8b51e46fe34b1a46478494e055c11a5c7a439d96f59c8d603d891b0d5

      • C:\Users\Admin\AppData\Local\Temp\u2lg.0.exe

        Filesize

        270KB

        MD5

        8ed49d27b8ccab5a03e6e822694fdaa1

        SHA1

        cf47d93e906e3f93329ceeedd061be95c4b1047b

        SHA256

        7ee946a36cdb7fa51dae1b2fc51ab628a7c7af1a01446c0413c0fba6aaff9a77

        SHA512

        551ca597962d6b818e31fc7a414a7dc62e981672092a12a282a6549573138e460187df8339582c6f52f204752c00047b39b6a33ccc546d194ccc8731fcf94512

      • C:\Users\Admin\AppData\Local\Temp\u2lg.1.exe

        Filesize

        4.6MB

        MD5

        397926927bca55be4a77839b1c44de6e

        SHA1

        e10f3434ef3021c399dbba047832f02b3c898dbd

        SHA256

        4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7

        SHA512

        cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

      • memory/1848-139-0x0000000072700000-0x000000007287D000-memory.dmp

        Filesize

        1.5MB

      • memory/1848-119-0x0000000072700000-0x000000007287D000-memory.dmp

        Filesize

        1.5MB

      • memory/1848-120-0x00007FFDCFC60000-0x00007FFDCFE69000-memory.dmp

        Filesize

        2.0MB

      • memory/1848-121-0x0000000072700000-0x000000007287D000-memory.dmp

        Filesize

        1.5MB

      • memory/2260-101-0x00007FFDCFC60000-0x00007FFDCFE69000-memory.dmp

        Filesize

        2.0MB

      • memory/2260-100-0x0000000072700000-0x000000007287D000-memory.dmp

        Filesize

        1.5MB

      • memory/3272-60-0x00000000029A0000-0x00000000029A1000-memory.dmp

        Filesize

        4KB

      • memory/3272-144-0x0000000000400000-0x00000000008AD000-memory.dmp

        Filesize

        4.7MB

      • memory/3272-146-0x00000000029A0000-0x00000000029A1000-memory.dmp

        Filesize

        4KB

      • memory/3364-20-0x0000000002FB0000-0x00000000030B0000-memory.dmp

        Filesize

        1024KB

      • memory/3364-19-0x0000000003230000-0x000000000329E000-memory.dmp

        Filesize

        440KB

      • memory/3364-3-0x0000000000400000-0x0000000002C4A000-memory.dmp

        Filesize

        40.3MB

      • memory/3364-2-0x0000000003230000-0x000000000329E000-memory.dmp

        Filesize

        440KB

      • memory/3364-17-0x0000000000400000-0x0000000002C4A000-memory.dmp

        Filesize

        40.3MB

      • memory/3364-65-0x0000000000400000-0x0000000002C4A000-memory.dmp

        Filesize

        40.3MB

      • memory/3364-1-0x0000000002FB0000-0x00000000030B0000-memory.dmp

        Filesize

        1024KB

      • memory/4192-141-0x0000000072700000-0x000000007287D000-memory.dmp

        Filesize

        1.5MB

      • memory/4192-143-0x00007FFDCFC60000-0x00007FFDCFE69000-memory.dmp

        Filesize

        2.0MB

      • memory/4480-44-0x00000000044A0000-0x00000000044A1000-memory.dmp

        Filesize

        4KB

      • memory/4480-43-0x0000000000400000-0x0000000000BEB000-memory.dmp

        Filesize

        7.9MB

      • memory/4480-67-0x0000000072700000-0x000000007287D000-memory.dmp

        Filesize

        1.5MB

      • memory/4480-87-0x0000000072700000-0x000000007287D000-memory.dmp

        Filesize

        1.5MB

      • memory/4480-122-0x0000000072700000-0x000000007287D000-memory.dmp

        Filesize

        1.5MB

      • memory/4480-123-0x0000000000400000-0x0000000000BEB000-memory.dmp

        Filesize

        7.9MB

      • memory/4480-68-0x00007FFDCFC60000-0x00007FFDCFE69000-memory.dmp

        Filesize

        2.0MB

      • memory/4480-71-0x0000000072700000-0x000000007287D000-memory.dmp

        Filesize

        1.5MB

      • memory/4828-16-0x0000000000400000-0x0000000002C26000-memory.dmp

        Filesize

        40.1MB

      • memory/4828-13-0x0000000002E30000-0x0000000002F30000-memory.dmp

        Filesize

        1024KB

      • memory/4828-14-0x00000000031B0000-0x00000000031D7000-memory.dmp

        Filesize

        156KB

      • memory/4828-15-0x0000000000400000-0x0000000002C26000-memory.dmp

        Filesize

        40.1MB