Analysis

  • max time kernel
    90s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-07-2024 06:02

General

  • Target

    7e559097f4e87c8e7d7850bf969e86fa556f090455318c79abc23514201f99d4.exe

  • Size

    209KB

  • MD5

    ead5c20b175ebddfc294f19d276d9f5a

  • SHA1

    f74b6cecb5a68042dee54de356a2ab8ca9d7f622

  • SHA256

    7e559097f4e87c8e7d7850bf969e86fa556f090455318c79abc23514201f99d4

  • SHA512

    2ad1a7460b4937cae9702ef5c3c0195ebfea3a352dbc6d978da978120e546b5c1b63c12d0a0a3d16b2f960d168437f477431f7e51ad6e6a078920cdc37e09cce

  • SSDEEP

    3072:PLvfMR1x/WF2sMe/ZLahwlaMS3dpPEoPWZ3G0P7705YHDghMGwQ:PLvUR1x/uxWrpPh2jvGwQ

Malware Config

Extracted

Family

stealc

Botnet

sila

C2

http://85.28.47.31

Attributes
  • url_path

    /5499d72b3a3e55be.php

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e559097f4e87c8e7d7850bf969e86fa556f090455318c79abc23514201f99d4.exe
    "C:\Users\Admin\AppData\Local\Temp\7e559097f4e87c8e7d7850bf969e86fa556f090455318c79abc23514201f99d4.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:936
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 1380
      2⤵
      • Program crash
      PID:3724
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 936 -ip 936
    1⤵
      PID:2388

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/936-1-0x0000000000810000-0x0000000000910000-memory.dmp

      Filesize

      1024KB

    • memory/936-3-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB

    • memory/936-2-0x0000000000C20000-0x0000000000C50000-memory.dmp

      Filesize

      192KB

    • memory/936-4-0x0000000000400000-0x0000000000643000-memory.dmp

      Filesize

      2.3MB