Analysis
-
max time kernel
111s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
d1e360f356f8ac430b5fed34b3a0a660.exe
Resource
win7-20240220-en
General
-
Target
d1e360f356f8ac430b5fed34b3a0a660.exe
-
Size
307KB
-
MD5
d1e360f356f8ac430b5fed34b3a0a660
-
SHA1
7aab5d765bc1c3d29510804bb5dfa14a47722218
-
SHA256
b708baa9b529adc2da4c9dfeef1a7c62d1a9cc231cb82561334de8c0a99cbbdb
-
SHA512
705060b9a70166724a68000f39142cee88d0951b33612f03619f6c40a2c9561a98f9bcdd5e210998d3cef9107b49cc560da22f7749c18a59d4525b593c2166fd
-
SSDEEP
3072:J5a5c3ZPpgukTT1ni8+WbLOT4iNm1jktYRflHMWUn72Z+qPz+yWYeiHEFI7I8NU:F5GuaZRIFmBSYtlHm++q7GmEFMNU
Malware Config
Extracted
stealc
http://185.172.128.151
-
url_path
/7043a0c6a68d9c65.php
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1016 2056 WerFault.exe d1e360f356f8ac430b5fed34b3a0a660.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
d1e360f356f8ac430b5fed34b3a0a660.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d1e360f356f8ac430b5fed34b3a0a660.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d1e360f356f8ac430b5fed34b3a0a660.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d1e360f356f8ac430b5fed34b3a0a660.exepid process 2056 d1e360f356f8ac430b5fed34b3a0a660.exe 2056 d1e360f356f8ac430b5fed34b3a0a660.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1e360f356f8ac430b5fed34b3a0a660.exe"C:\Users\Admin\AppData\Local\Temp\d1e360f356f8ac430b5fed34b3a0a660.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 12922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2056 -ip 20561⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2056-2-0x0000000001B30000-0x0000000001B57000-memory.dmpFilesize
156KB
-
memory/2056-1-0x0000000001DA0000-0x0000000001EA0000-memory.dmpFilesize
1024KB
-
memory/2056-3-0x0000000000400000-0x0000000001A18000-memory.dmpFilesize
22.1MB
-
memory/2056-4-0x0000000000400000-0x0000000001A18000-memory.dmpFilesize
22.1MB
-
memory/2056-5-0x0000000001DA0000-0x0000000001EA0000-memory.dmpFilesize
1024KB
-
memory/2056-7-0x0000000000400000-0x0000000001A18000-memory.dmpFilesize
22.1MB
-
memory/2056-9-0x0000000000400000-0x0000000001A18000-memory.dmpFilesize
22.1MB
-
memory/2056-11-0x0000000000400000-0x0000000001A18000-memory.dmpFilesize
22.1MB
-
memory/2056-13-0x0000000000400000-0x0000000001A18000-memory.dmpFilesize
22.1MB