Analysis
-
max time kernel
111s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 06:26
Static task
static1
Behavioral task
behavioral1
Sample
76b73bd1533ce48cd2cf55316e62b3869e920992c4d76.exe
Resource
win7-20240221-en
General
-
Target
76b73bd1533ce48cd2cf55316e62b3869e920992c4d76.exe
-
Size
311KB
-
MD5
d8f0480ffd9a82c2532b6be3fbee1a76
-
SHA1
c72dc3cab1dc67c8039e7acabef9776fb244d74a
-
SHA256
76b73bd1533ce48cd2cf55316e62b3869e920992c4d7673339f9c5eefa7d922a
-
SHA512
13daf8bf9853043ad1913f45b634ac4d7b59d9320101e5b30ce9407ec1ca15fa1a990e67409cf9d3aeab10107a6e8ead6e79f55fee718a844a38556817c92116
-
SSDEEP
3072:iFqVGEq2prYKers2Hnq+nzwwgcw6KSLv3yR9uZZjCAi619HE/0JI7JZjODE:9RbtDt61byzuXjJ1xEYOODE
Malware Config
Extracted
stealc
http://185.172.128.62
-
url_path
/902e53a07830e030.php
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2928 1320 WerFault.exe 76b73bd1533ce48cd2cf55316e62b3869e920992c4d76.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
76b73bd1533ce48cd2cf55316e62b3869e920992c4d76.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 76b73bd1533ce48cd2cf55316e62b3869e920992c4d76.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 76b73bd1533ce48cd2cf55316e62b3869e920992c4d76.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
76b73bd1533ce48cd2cf55316e62b3869e920992c4d76.exepid process 1320 76b73bd1533ce48cd2cf55316e62b3869e920992c4d76.exe 1320 76b73bd1533ce48cd2cf55316e62b3869e920992c4d76.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76b73bd1533ce48cd2cf55316e62b3869e920992c4d76.exe"C:\Users\Admin\AppData\Local\Temp\76b73bd1533ce48cd2cf55316e62b3869e920992c4d76.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 13282⤵
- Program crash
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1320 -ip 13201⤵PID:1640