Analysis
-
max time kernel
121s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 20:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
random.exe
-
Size
2.4MB
-
MD5
f7a1094ec901c30a546487c8aa2a3093
-
SHA1
5818379023c31c60cc63df13710b07ea8c791181
-
SHA256
579804532d286ba442de9a9f8b9a20a2d5239eb510558805fa18ec0717182e0f
-
SHA512
ada3d3b87f01ed5db7b0de44f94b128a154113e5ef0fcabf1117ee5250d171d5f74b637a783c71ab5e16c4b7427c089702e63a9080f5661d0d616c5a3c087af5
-
SSDEEP
49152:z7JRjKf3hvcH2lpm74xGmToTzUHf6KEQmbufIJEOoc9z:T+fxEHApmhDTzof6tQmbJEi
Malware Config
Extracted
Family
stealc
Botnet
jony
C2
http://85.28.47.4
Attributes
-
url_path
/920475a59bac849d.php
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 2356 random.exe 2356 random.exe 2356 random.exe 2356 random.exe 2356 random.exe 2356 random.exe 2356 random.exe 2356 random.exe 2356 random.exe 2356 random.exe 2356 random.exe 2356 random.exe 2356 random.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString random.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2356 random.exe 2356 random.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2356 random.exe