Analysis
-
max time kernel
86s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 22:36
Behavioral task
behavioral1
Sample
1aeb3a19d439d8a4a00313d12f463827.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1aeb3a19d439d8a4a00313d12f463827.exe
Resource
win10v2004-20240508-en
General
-
Target
1aeb3a19d439d8a4a00313d12f463827.exe
-
Size
989KB
-
MD5
1aeb3a19d439d8a4a00313d12f463827
-
SHA1
beedd7366e1ef168595d800ebe013067c78775de
-
SHA256
b0e5fddc8448dc854ab400c9b0ac82c43a2f44fa6970cd2975e7d28116a7740d
-
SHA512
074c2316d385feb4c78e6068a8fbf37d570bb9ee87a69b76bc3878a1b18eb9f97ca6511709008dcc60158d0dc81395adaed5e309d0266ed7713e7e5e4e442422
-
SSDEEP
24576:liG03BDYmHDQKcdE2v4jtaUN4cDHZgboRxRprGE:oJYuHTI4jJJObkf
Malware Config
Extracted
stealc
night26
http://188.130.207.35
-
url_path
/0b92e7ab19e861f9.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral2/memory/1900-5-0x0000000140000000-0x0000000140112000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Deletes itself 1 IoCs
pid Process 4440 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 4440 1900 1aeb3a19d439d8a4a00313d12f463827.exe 80 -
Program crash 1 IoCs
pid pid_target Process procid_target 4904 2840 WerFault.exe 82 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1900 1aeb3a19d439d8a4a00313d12f463827.exe 1900 1aeb3a19d439d8a4a00313d12f463827.exe 4440 cmd.exe 4440 cmd.exe 2840 explorer.exe 2840 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1900 1aeb3a19d439d8a4a00313d12f463827.exe 4440 cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1900 wrote to memory of 4440 1900 1aeb3a19d439d8a4a00313d12f463827.exe 80 PID 1900 wrote to memory of 4440 1900 1aeb3a19d439d8a4a00313d12f463827.exe 80 PID 1900 wrote to memory of 4440 1900 1aeb3a19d439d8a4a00313d12f463827.exe 80 PID 1900 wrote to memory of 4440 1900 1aeb3a19d439d8a4a00313d12f463827.exe 80 PID 4440 wrote to memory of 2840 4440 cmd.exe 82 PID 4440 wrote to memory of 2840 4440 cmd.exe 82 PID 4440 wrote to memory of 2840 4440 cmd.exe 82 PID 4440 wrote to memory of 2840 4440 cmd.exe 82 PID 4440 wrote to memory of 2840 4440 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aeb3a19d439d8a4a00313d12f463827.exe"C:\Users\Admin\AppData\Local\Temp\1aeb3a19d439d8a4a00313d12f463827.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 8684⤵
- Program crash
PID:4904
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 2840 -ip 28401⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
870KB
MD5a7d2715640007113c4449d8e920c9a4f
SHA1b670ccae58b3ef39b36654a2ad264bc440f0583f
SHA256f9f840d62fc4f505b91cb9ffddd8f04a11e0df8a3f5bf57512d5e0df71f91538
SHA51267c98adae1a5a6fdd26ee1db853248268621030e1ae2d499f8a400cf8dcece49c4df39510d5c70b872a87cf9d760f6b9b394ee3581655747031a63f9ac55f9bb
-
Filesize
25B
MD571bfa4b1b2a2049befa50a86463a014f
SHA18ca6218c1f92b40da01501e18786cc2724e4c769
SHA256a4683279940ca2ea6c25b63f07f41d7e2eab4ac3246ff57c8c771e7c923abd29
SHA512574ccbc6a9387eed4e74af3e06a5023db1f74e24a8a9f3e9a96bee77483c3e5da257df4ff7976f7e389f51ec9ca89c56b103186fe499f5f3839738cafe657735