Resubmissions

19-06-2024 21:00

240619-ztfnva1fkd 10

19-06-2024 20:53

240619-zpdnpawalj 10

19-06-2024 20:28

240619-y876zazfpd 10

Analysis

  • max time kernel
    246s
  • max time network
    254s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-06-2024 20:28

General

  • Target

    hijackloader_stealc_new_hash.exe

  • Size

    922KB

  • MD5

    4081d00fabf6ba8e9eb58202ea053735

  • SHA1

    22afaf01961b36e741d104bd3b96ce8df4fbf519

  • SHA256

    ef62979af506ec3ac2c176bc667465940ca4a1e4f8229e0bc992fec715d43ae8

  • SHA512

    1434efa23afd3cb95d0a55a17b246cbee0179072660ce0458701cf9b3b8075217b0864be09a2bbc428c2b9f2253cace6361f874ad8f1d2f472f9f34bd0bc4eda

  • SSDEEP

    24576:e8inyEBCZN5hoVlnJXzJ/SEVSoMAALia4:DgABuxF/SRF4

Malware Config

Extracted

Family

stealc

Botnet

cozy15

C2

http://193.163.7.88

Attributes
  • url_path

    /a69d09b357e06b52.php

Signatures

  • Detects HijackLoader (aka IDAT Loader) 1 IoCs
  • HijackLoader

    HijackLoader is a multistage loader first seen in 2023.

  • Stealc

    Stealc is an infostealer written in C++.

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hijackloader_stealc_new_hash.exe
    "C:\Users\Admin\AppData\Local\Temp\hijackloader_stealc_new_hash.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4952
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\SysWOW64\cmd.exe
      2⤵
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4404
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
          PID:3068
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4168,i,11069752405888604640,8928124405695604965,262144 --variations-seed-version --mojo-platform-channel-handle=3908 /prefetch:8
      1⤵
        PID:2948

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7aed4e77

        Filesize

        861KB

        MD5

        ca493164b781ecb0c58276d9167e6159

        SHA1

        df8505381673c1beeb0dd3719f44b1adcdd1ab7c

        SHA256

        738c59f83386380ab3b8f79c936c4508f5c5580eb6c9d856e9ce39f391ff1c24

        SHA512

        e94d996a3a88e748bed92e5a3e9d4b455bc864152f6d9d2fe967d0f6a9ba4cc1e9e03180d3444df1158329ea65e8b8939f3f1998a04ed62b90871903d71b096b

      • memory/3068-20-0x0000000000240000-0x000000000047C000-memory.dmp

        Filesize

        2.2MB

      • memory/3068-19-0x00000000009C0000-0x0000000000DF3000-memory.dmp

        Filesize

        4.2MB

      • memory/3068-18-0x0000000000AA3000-0x0000000000AAB000-memory.dmp

        Filesize

        32KB

      • memory/3068-16-0x0000000000240000-0x000000000047C000-memory.dmp

        Filesize

        2.2MB

      • memory/3068-15-0x00007FF986E10000-0x00007FF987005000-memory.dmp

        Filesize

        2.0MB

      • memory/3068-14-0x0000000000240000-0x000000000047C000-memory.dmp

        Filesize

        2.2MB

      • memory/4404-9-0x00007FF986E10000-0x00007FF987005000-memory.dmp

        Filesize

        2.0MB

      • memory/4404-10-0x00000000753C0000-0x000000007553B000-memory.dmp

        Filesize

        1.5MB

      • memory/4404-11-0x00000000753C0000-0x000000007553B000-memory.dmp

        Filesize

        1.5MB

      • memory/4404-13-0x00000000753C0000-0x000000007553B000-memory.dmp

        Filesize

        1.5MB

      • memory/4404-7-0x00000000753C0000-0x000000007553B000-memory.dmp

        Filesize

        1.5MB

      • memory/4952-0-0x0000000000760000-0x0000000000848000-memory.dmp

        Filesize

        928KB

      • memory/4952-5-0x00000000753C0000-0x000000007553B000-memory.dmp

        Filesize

        1.5MB

      • memory/4952-4-0x00000000753C0000-0x000000007553B000-memory.dmp

        Filesize

        1.5MB

      • memory/4952-3-0x00000000753D2000-0x00000000753D4000-memory.dmp

        Filesize

        8KB

      • memory/4952-2-0x00007FF986E10000-0x00007FF987005000-memory.dmp

        Filesize

        2.0MB

      • memory/4952-1-0x00000000753C0000-0x000000007553B000-memory.dmp

        Filesize

        1.5MB