Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 10:21
Static task
static1
Behavioral task
behavioral1
Sample
9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe
Resource
win10v2004-20240508-en
General
-
Target
9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe
-
Size
218KB
-
MD5
28a1ec20020e0f282a7467bfaa73b1bb
-
SHA1
09321c21c96014d1836b3fe25ffcb3132a6f9ce5
-
SHA256
9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9
-
SHA512
21b098d4869e930f91d4bf9a7061eaa5e0e365c0462ee3f4653f0317e22b1c0197cb71548ef29be510d58a6b7b9d9dd050c725b675c2e774e75511f5394b384c
-
SSDEEP
3072:PAhQ//Key6sTKdNJh80s+BSi5cHUICx03C1withR5bVlgM:Iy//KycKbv80s+V5c5C03sjz
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 848 4280 WerFault.exe 81 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4008 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4280 9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe 4280 9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4280 wrote to memory of 3936 4280 9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe 89 PID 4280 wrote to memory of 3936 4280 9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe 89 PID 4280 wrote to memory of 3936 4280 9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe 89 PID 3936 wrote to memory of 4008 3936 cmd.exe 93 PID 3936 wrote to memory of 4008 3936 cmd.exe 93 PID 3936 wrote to memory of 4008 3936 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe"C:\Users\Admin\AppData\Local\Temp\9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\9f1c239226fd84c5e2f72a8707cbc0cea05d227515918b4b462e0971332d91a9.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:4008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 10362⤵
- Program crash
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4280 -ip 42801⤵PID:3984