Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 23:51
Behavioral task
behavioral1
Sample
E036A20D879B669BF96F17A6F17F4C4D.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
E036A20D879B669BF96F17A6F17F4C4D.exe
Resource
win10v2004-20240709-en
General
-
Target
E036A20D879B669BF96F17A6F17F4C4D.exe
-
Size
3.5MB
-
MD5
e036a20d879b669bf96f17a6f17f4c4d
-
SHA1
95eaeb5d63da9766590e2b3c38fc98b46eb321b0
-
SHA256
d69a93df6cab86b34c970896181bb1b618317e29ca8b5586364256a1d02b7cca
-
SHA512
ab8aa5d6768c39b5880a2726e4b75e69f2007726debfaa3e6b3f94fcf72b8ce449c58a043d3020fe4fc4d4fc00782d3003c2f3b10f854fb8cad67c406aa185e7
-
SSDEEP
49152:Bw38SMypl3oScZUU1a4TutGP25RE7qD6yA8u8UZRUb4kig8tldrv+:qsfe3WUUI3h5RyqDTAH8UMboI
Malware Config
Extracted
stealc
meowsterioland1
http://46.8.238.240
-
url_path
/201a735ed890db75.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
resource yara_rule behavioral1/memory/1052-0-0x0000000000400000-0x000000000078D000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Deletes itself 1 IoCs
pid Process 2284 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1052 set thread context of 2284 1052 E036A20D879B669BF96F17A6F17F4C4D.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2736 3032 WerFault.exe 32 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1052 E036A20D879B669BF96F17A6F17F4C4D.exe 1052 E036A20D879B669BF96F17A6F17F4C4D.exe 2284 cmd.exe 2284 cmd.exe 3032 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1052 E036A20D879B669BF96F17A6F17F4C4D.exe 2284 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2284 1052 E036A20D879B669BF96F17A6F17F4C4D.exe 30 PID 1052 wrote to memory of 2284 1052 E036A20D879B669BF96F17A6F17F4C4D.exe 30 PID 1052 wrote to memory of 2284 1052 E036A20D879B669BF96F17A6F17F4C4D.exe 30 PID 1052 wrote to memory of 2284 1052 E036A20D879B669BF96F17A6F17F4C4D.exe 30 PID 1052 wrote to memory of 2284 1052 E036A20D879B669BF96F17A6F17F4C4D.exe 30 PID 2284 wrote to memory of 3032 2284 cmd.exe 32 PID 2284 wrote to memory of 3032 2284 cmd.exe 32 PID 2284 wrote to memory of 3032 2284 cmd.exe 32 PID 2284 wrote to memory of 3032 2284 cmd.exe 32 PID 2284 wrote to memory of 3032 2284 cmd.exe 32 PID 3032 wrote to memory of 2736 3032 explorer.exe 33 PID 3032 wrote to memory of 2736 3032 explorer.exe 33 PID 3032 wrote to memory of 2736 3032 explorer.exe 33 PID 3032 wrote to memory of 2736 3032 explorer.exe 33 PID 2284 wrote to memory of 3032 2284 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\E036A20D879B669BF96F17A6F17F4C4D.exe"C:\Users\Admin\AppData\Local\Temp\E036A20D879B669BF96F17A6F17F4C4D.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 8404⤵
- Program crash
PID:2736
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
871KB
MD56bf9b3c6d3ff952548fdafe58683b97e
SHA1e04c0250506e730ea98904297ebe66c8d6cffb79
SHA256863609d9c492b3833f0a19042f6f4fc1806e891e7964a12048a461332a1fc779
SHA5126761e41972e09f4c953a8c063b7163e3bc66bb335087b1f73925e1405904dcad6d615e12f98b7260aef01246a41b2f091918afa5a6c0ecdc3228aabe97920951