Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
9d84bd88528a492f52572cea1a2689c8c6a24a51952fefe1ab9b906a2db55851.exe
Resource
win7-20240708-en
General
-
Target
9d84bd88528a492f52572cea1a2689c8c6a24a51952fefe1ab9b906a2db55851.exe
-
Size
1.1MB
-
MD5
5c7ff49de036381730348329bc5bc465
-
SHA1
206188a617378901c7cc8a1045846c5c5170eb63
-
SHA256
9d84bd88528a492f52572cea1a2689c8c6a24a51952fefe1ab9b906a2db55851
-
SHA512
6cdc8e7f67923bd029c622bac8036ac418c6476b7db6f979e58dc393b3062ff6f667daaec5e2215fea7170e3e2e91bccc71a1dfc1eb402c6aae5f7541d08b657
-
SSDEEP
24576:IiMaTshEaA6WoEliUCPqTnZsvJF4jzhyXPBihpKzZyCQY32bMh:hMkJ9EEoknZsvIXhyXrzZyY32b
Malware Config
Extracted
stealc
sila
http://85.28.47.31
-
url_path
/5499d72b3a3e55be.php
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2116 9d84bd88528a492f52572cea1a2689c8c6a24a51952fefe1ab9b906a2db55851.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d84bd88528a492f52572cea1a2689c8c6a24a51952fefe1ab9b906a2db55851.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2116 9d84bd88528a492f52572cea1a2689c8c6a24a51952fefe1ab9b906a2db55851.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d84bd88528a492f52572cea1a2689c8c6a24a51952fefe1ab9b906a2db55851.exe"C:\Users\Admin\AppData\Local\Temp\9d84bd88528a492f52572cea1a2689c8c6a24a51952fefe1ab9b906a2db55851.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2116