Analysis

  • max time kernel
    121s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 20:59

General

  • Target

    random.exe

  • Size

    2.4MB

  • MD5

    f7a1094ec901c30a546487c8aa2a3093

  • SHA1

    5818379023c31c60cc63df13710b07ea8c791181

  • SHA256

    579804532d286ba442de9a9f8b9a20a2d5239eb510558805fa18ec0717182e0f

  • SHA512

    ada3d3b87f01ed5db7b0de44f94b128a154113e5ef0fcabf1117ee5250d171d5f74b637a783c71ab5e16c4b7427c089702e63a9080f5661d0d616c5a3c087af5

  • SSDEEP

    49152:z7JRjKf3hvcH2lpm74xGmToTzUHf6KEQmbufIJEOoc9z:T+fxEHApmhDTzof6tQmbJEi

Malware Config

Extracted

Family

stealc

Botnet

jony

C2

http://85.28.47.4

Attributes
  • url_path

    /920475a59bac849d.php

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2356-0-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-1-0x000000007F650000-0x000000007FA21000-memory.dmp

    Filesize

    3.8MB

  • memory/2356-2-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-3-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-4-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-5-0x000000007F650000-0x000000007FA21000-memory.dmp

    Filesize

    3.8MB

  • memory/2356-6-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-7-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-8-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-9-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-10-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-11-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-12-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-13-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-14-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB

  • memory/2356-15-0x00000000006B0000-0x000000000129E000-memory.dmp

    Filesize

    11.9MB