Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-06-2024 09:52

General

  • Target

    ##!!SetUp_2244_Pa$sW0rd$$!!/Setup.exe

  • Size

    94KB

  • MD5

    9a4cc0d8e7007f7ef20ca585324e0739

  • SHA1

    f3e5a2e477cac4bab85940a2158eed78f2d74441

  • SHA256

    040d121a3179f49cd3f33f4bc998bc8f78b7f560bfd93f279224d69e76a06e92

  • SHA512

    54636a48141804112f5b4f2fc70cb7c959a041e5743aeedb5184091b51daa1d1a03f0016e8299c0d56d924c6c8ae585e4fc864021081ffdf1e6f3eab11dd43b3

  • SSDEEP

    1536:9M/AhIxHHWMpdPa5wiE21M8kJIGFvb1Cwn/ZDs5yf:9M4SwMpdCq/IM8uIGfV/ZDso

Malware Config

Extracted

Family

stealc

rc4.plain

Signatures

  • Detect Vidar Stealer 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\##!!SetUp_2244_Pa$sW0rd$$!!\Setup.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\SysWOW64\netsh.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:328
      • C:\Users\Admin\AppData\Local\Temp\coml.au3
        C:\Users\Admin\AppData\Local\Temp\coml.au3
        3⤵
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4684
        • C:\ProgramData\FBFCAKKKFB.exe
          "C:\ProgramData\FBFCAKKKFB.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3028
          • C:\Windows\SysWOW64\ftp.exe
            C:\Windows\SysWOW64\ftp.exe
            5⤵
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:3796
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              6⤵
                PID:4112
          • C:\ProgramData\CBFIIEHJDB.exe
            "C:\ProgramData\CBFIIEHJDB.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:5096
            • C:\Windows\SysWOW64\ftp.exe
              C:\Windows\SysWOW64\ftp.exe
              5⤵
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:616
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3760
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\AFCFHJJECAEH" & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1000
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              5⤵
              • Delays execution with timeout.exe
              PID:3024

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    4
    T1552

    Credentials In Files

    4
    T1552.001

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    4
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\AFCFHJJECAEH\CBFIIE
      Filesize

      64KB

      MD5

      c8260d37073d07384063820fcd97cb1c

      SHA1

      25324c500695d19e4a0a0824228576a59f9abe58

      SHA256

      29391ff5068cfd037ed486db2fd2bc780731ca952df39377240aa4456f176560

      SHA512

      ffbba119b938f8227907792b8a7853daf8c8279c9f3e0f4408ddb324b21a75d093e8790efe4a7e6876b171a2cffb71022cd7a8d2f4fd1ac5b813c5aec4d6bd4b

    • C:\ProgramData\AFCFHJJECAEH\IJKKEH
      Filesize

      64KB

      MD5

      41ac544896c59f0f47c5422e8d8cbe3c

      SHA1

      4fac0744d1c5eb1fb9da3b9fac67f690639c1ebc

      SHA256

      a46a88cd9a2318aa069993b23acf27db06f528ca5bdbebee717e25b38a5dc45a

      SHA512

      83ab24023f5b16bc5d549a8d934cfe9f1a79bc87f3c579992e6cf885cb9f14e2facef8b83d1af7b141fb23285d1509779da17236a587436127a9ccacedcb9e35

    • C:\ProgramData\AFCFHJJECAEH\JJECGC
      Filesize

      512KB

      MD5

      59071590099d21dd439896592338bf95

      SHA1

      6a521e1d2a632c26e53b83d2cc4b0edecfc1e68c

      SHA256

      07854d2fef297a06ba81685e660c332de36d5d18d546927d30daad6d7fda1541

      SHA512

      eedb6cadbceb2c991fc6f68dccb80463b3f660c5358acd7d705398ae2e3df2b4327f0f6c6746486848bd2992b379776483a98063ae96edb45877bb0314874668

    • C:\ProgramData\AFCFHJJECAEH\VCRUNT~1.DLL
      Filesize

      78KB

      MD5

      a37ee36b536409056a86f50e67777dd7

      SHA1

      1cafa159292aa736fc595fc04e16325b27cd6750

      SHA256

      8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

      SHA512

      3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

    • C:\ProgramData\AFCFHJJECAEH\mozglue.dll
      Filesize

      593KB

      MD5

      c8fd9be83bc728cc04beffafc2907fe9

      SHA1

      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

      SHA256

      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

      SHA512

      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

    • C:\ProgramData\AFCFHJJECAEH\msvcp140.dll
      Filesize

      439KB

      MD5

      5ff1fca37c466d6723ec67be93b51442

      SHA1

      34cc4e158092083b13d67d6d2bc9e57b798a303b

      SHA256

      5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

      SHA512

      4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

    • C:\ProgramData\AFCFHJJECAEH\nss3.dll
      Filesize

      2.0MB

      MD5

      1cc453cdf74f31e4d913ff9c10acdde2

      SHA1

      6e85eae544d6e965f15fa5c39700fa7202f3aafe

      SHA256

      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

      SHA512

      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

    • C:\ProgramData\AFCFHJJECAEH\softokn3.dll
      Filesize

      251KB

      MD5

      4e52d739c324db8225bd9ab2695f262f

      SHA1

      71c3da43dc5a0d2a1941e874a6d015a071783889

      SHA256

      74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a

      SHA512

      2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6

    • C:\ProgramData\CBFIIEHJDB.exe
      Filesize

      2.3MB

      MD5

      daaff76b0baf0a1f9cec253560c5db20

      SHA1

      0311cf0eeb4beddd2c69c6e97462595313a41e78

      SHA256

      5706c6f5421a6a34fdcb67e9c9e71283c8fc1c33499904519cbdc6a21e6b071c

      SHA512

      987ca2d67903c65ee1075c4a5250c85840aea26647b1d95a3e73a26dcad053bd4c31df4ca01d6cc0c196fa7e8e84ab63ed4a537f72fc0b1ee4ba09cdb549ddf3

    • C:\ProgramData\FBFCAKKKFB.exe
      Filesize

      8.6MB

      MD5

      6cfddd5ce9ca4bb209bd5d8c2cd80025

      SHA1

      424da82e9edbb6b39a979ab97d84239a1d67c48b

      SHA256

      376e1802b979514ba0e9c73933a8c6a09dd3f1d2a289f420c2202e64503d08a7

      SHA512

      d861130d87bfedc38a97019cba17724067f397e6ffe7e1384175db48c0a177a2e7e256c3c933d0f42766e8077f767d6d4dc8758200852e8ec135736daee7c0f8

    • C:\Users\Admin\AppData\Local\Temp\2fa5f2cf
      Filesize

      1.1MB

      MD5

      8d443e7cb87cacf0f589ce55599e008f

      SHA1

      c7ff0475a3978271e0a8417ac4a826089c083772

      SHA256

      e2aaaa1a0431aab1616e2b612e9b68448107e6ce71333f9c0ec1763023b72b2a

      SHA512

      c7d0ced6eb9e203d481d1dbdd5965278620c10cdc81c02da9c4f7f99f3f8c61dfe975cf48d4b93ccde9857edb881a77ebe9cd13ae7ef029285d770d767aa74a5

    • C:\Users\Admin\AppData\Local\Temp\31fa1a1d
      Filesize

      1.1MB

      MD5

      5159a8ebeab8f6c87b27c2d57c45ab96

      SHA1

      eb9409a2396b51e8ec7c8b363c6085237b0001bf

      SHA256

      dbd302a0bf2a042ae5e648d885bc99f055e0981b3c6b4f8ff1d14017220da58f

      SHA512

      8296a77aec53929db2cf596d7dbad0df471530f0ff47eaba007a9222d2675578764ed61f2f9c2947526d9d2a3e3cc8035e595c3c07ead3ae394117c0cde0a61f

    • C:\Users\Admin\AppData\Local\Temp\36db2e25
      Filesize

      951KB

      MD5

      c62f812e250409fbd3c78141984270f2

      SHA1

      9c7c70bb78aa0de4ccf0c2b5d87b37c8a40bd806

      SHA256

      d8617477c800cc10f9b52e90b885117a27266831fb5033647b6b6bd6025380a8

      SHA512

      7573ecac1725f395bbb1661f743d8ee6b029f357d3ef07d0d96ee4ff3548fe06fab105ee72be3e3964d2053de2f44245cca9a061d47c1411949840c84f6e9092

    • C:\Users\Admin\AppData\Local\Temp\3992bc96
      Filesize

      736KB

      MD5

      6bd0a99c38fe20de81a9f78bbbe6bd95

      SHA1

      92cea25d38c57fd6d46ca328fe1854abc2c23805

      SHA256

      32312034fb74f36e9dbdba795e9c8405406db28d60201223ea6a01a180c6c3c4

      SHA512

      ac7d99e5b76ee731fd1e34136aae10b0cacd9d83c711633dab4da2a2e73c9effd0a51af9a2715214234f7bd6c001787e8afc17c6df9ef43f79dfcb31b0f48de8

    • C:\Users\Admin\AppData\Local\Temp\856deca5
      Filesize

      6.8MB

      MD5

      9bfdb10d8a2c44f1817d90f68d5460f6

      SHA1

      cc2bde49d03cd97b55915a187c1aa23f08cbf489

      SHA256

      a8fc48ba4970de1bd43e6ec83a0f44345b01b0593578554fd2a9cece754157ef

      SHA512

      f349e3299b883ca69822190195ddf00deaeb80340fb114691c35a8f8084468d59120b30d9c25d36e12dc499cf70db833b608265b987ea0feca5de29781e2b61c

    • C:\Users\Admin\AppData\Local\Temp\coml.au3
      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • memory/328-10-0x00007FFFD5760000-0x00007FFFD5969000-memory.dmp
      Filesize

      2.0MB

    • memory/328-17-0x0000000073851000-0x000000007385F000-memory.dmp
      Filesize

      56KB

    • memory/328-12-0x000000007385E000-0x0000000073860000-memory.dmp
      Filesize

      8KB

    • memory/328-13-0x0000000073851000-0x000000007385F000-memory.dmp
      Filesize

      56KB

    • memory/616-200-0x00007FFFD5760000-0x00007FFFD5969000-memory.dmp
      Filesize

      2.0MB

    • memory/616-216-0x0000000071D70000-0x0000000071EED000-memory.dmp
      Filesize

      1.5MB

    • memory/2856-7-0x00007FFFB50E0000-0x00007FFFB525A000-memory.dmp
      Filesize

      1.5MB

    • memory/2856-0-0x00007FFFB50E0000-0x00007FFFB525A000-memory.dmp
      Filesize

      1.5MB

    • memory/2856-6-0x00007FFFB50E0000-0x00007FFFB525A000-memory.dmp
      Filesize

      1.5MB

    • memory/2856-5-0x00007FFFB50F8000-0x00007FFFB50F9000-memory.dmp
      Filesize

      4KB

    • memory/3028-116-0x0000000000860000-0x0000000000D73000-memory.dmp
      Filesize

      5.1MB

    • memory/3028-123-0x00007FFFD5760000-0x00007FFFD5969000-memory.dmp
      Filesize

      2.0MB

    • memory/3028-180-0x0000000071D70000-0x0000000071EED000-memory.dmp
      Filesize

      1.5MB

    • memory/3028-122-0x0000000071D70000-0x0000000071EED000-memory.dmp
      Filesize

      1.5MB

    • memory/3760-222-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/3760-218-0x00007FFFB3D30000-0x00007FFFB53D0000-memory.dmp
      Filesize

      22.6MB

    • memory/3796-201-0x0000000071D70000-0x0000000071EED000-memory.dmp
      Filesize

      1.5MB

    • memory/3796-199-0x00007FFFD5760000-0x00007FFFD5969000-memory.dmp
      Filesize

      2.0MB

    • memory/4684-21-0x00007FFFD5760000-0x00007FFFD5969000-memory.dmp
      Filesize

      2.0MB

    • memory/4684-198-0x0000000000B50000-0x000000000129C000-memory.dmp
      Filesize

      7.3MB

    • memory/4684-112-0x0000000000B50000-0x000000000129C000-memory.dmp
      Filesize

      7.3MB

    • memory/4684-28-0x0000000061E00000-0x0000000061EF3000-memory.dmp
      Filesize

      972KB

    • memory/4684-22-0x0000000000B50000-0x000000000129C000-memory.dmp
      Filesize

      7.3MB

    • memory/4684-19-0x0000000000B50000-0x000000000129C000-memory.dmp
      Filesize

      7.3MB

    • memory/4684-176-0x0000000000B50000-0x000000000129C000-memory.dmp
      Filesize

      7.3MB

    • memory/4684-175-0x0000000000B50000-0x000000000129C000-memory.dmp
      Filesize

      7.3MB

    • memory/5096-140-0x0000000071D70000-0x0000000071EED000-memory.dmp
      Filesize

      1.5MB

    • memory/5096-193-0x0000000071D70000-0x0000000071EED000-memory.dmp
      Filesize

      1.5MB

    • memory/5096-141-0x00007FFFD5760000-0x00007FFFD5969000-memory.dmp
      Filesize

      2.0MB

    • memory/5096-134-0x0000000000D70000-0x0000000000FB8000-memory.dmp
      Filesize

      2.3MB