Resubmissions
19-06-2024 21:00
240619-ztfnva1fkd 1019-06-2024 20:53
240619-zpdnpawalj 1019-06-2024 20:28
240619-y876zazfpd 10Analysis
-
max time kernel
246s -
max time network
254s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 20:28
Behavioral task
behavioral1
Sample
hijackloader_stealc_new_hash.exe
Resource
win10v2004-20240611-en
General
-
Target
hijackloader_stealc_new_hash.exe
-
Size
922KB
-
MD5
4081d00fabf6ba8e9eb58202ea053735
-
SHA1
22afaf01961b36e741d104bd3b96ce8df4fbf519
-
SHA256
ef62979af506ec3ac2c176bc667465940ca4a1e4f8229e0bc992fec715d43ae8
-
SHA512
1434efa23afd3cb95d0a55a17b246cbee0179072660ce0458701cf9b3b8075217b0864be09a2bbc428c2b9f2253cace6361f874ad8f1d2f472f9f34bd0bc4eda
-
SSDEEP
24576:e8inyEBCZN5hoVlnJXzJ/SEVSoMAALia4:DgABuxF/SRF4
Malware Config
Extracted
stealc
cozy15
http://193.163.7.88
-
url_path
/a69d09b357e06b52.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral1/memory/4952-0-0x0000000000760000-0x0000000000848000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Deletes itself 1 IoCs
pid Process 4404 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4952 set thread context of 4404 4952 hijackloader_stealc_new_hash.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4952 hijackloader_stealc_new_hash.exe 4952 hijackloader_stealc_new_hash.exe 4404 cmd.exe 4404 cmd.exe 4404 cmd.exe 4404 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4952 hijackloader_stealc_new_hash.exe 4404 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4952 wrote to memory of 4404 4952 hijackloader_stealc_new_hash.exe 90 PID 4952 wrote to memory of 4404 4952 hijackloader_stealc_new_hash.exe 90 PID 4952 wrote to memory of 4404 4952 hijackloader_stealc_new_hash.exe 90 PID 4952 wrote to memory of 4404 4952 hijackloader_stealc_new_hash.exe 90 PID 4404 wrote to memory of 3068 4404 cmd.exe 104 PID 4404 wrote to memory of 3068 4404 cmd.exe 104 PID 4404 wrote to memory of 3068 4404 cmd.exe 104 PID 4404 wrote to memory of 3068 4404 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\hijackloader_stealc_new_hash.exe"C:\Users\Admin\AppData\Local\Temp\hijackloader_stealc_new_hash.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵PID:3068
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4168,i,11069752405888604640,8928124405695604965,262144 --variations-seed-version --mojo-platform-channel-handle=3908 /prefetch:81⤵PID:2948
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
861KB
MD5ca493164b781ecb0c58276d9167e6159
SHA1df8505381673c1beeb0dd3719f44b1adcdd1ab7c
SHA256738c59f83386380ab3b8f79c936c4508f5c5580eb6c9d856e9ce39f391ff1c24
SHA512e94d996a3a88e748bed92e5a3e9d4b455bc864152f6d9d2fe967d0f6a9ba4cc1e9e03180d3444df1158329ea65e8b8939f3f1998a04ed62b90871903d71b096b