Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 07:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240705-en
2 signatures
150 seconds
General
-
Target
file.exe
-
Size
244KB
-
MD5
c8b29f4c8c60a861b941dc46c03d41bc
-
SHA1
43e5e1266128f01d074d3aba20465ab19d26050b
-
SHA256
afddc92c285934cfa180d497fd271e5eae08117765a5797b3ecbd5bdeafe49d0
-
SHA512
50b5021b685fad9661f5d49e4e2fa53f0d7fd79e9c5a12cfe4faf29b0031ef6a1dd9828b367a144a52d9fa024440c4c19cdc528debc23442037f8a3e11e6af02
-
SSDEEP
3072:XCIAd6FdS37kE4PCiAiqPCU7mJSngqAE7qkkDZ0oOkr+7XPF3:yF6FILkvfAt7YGd7XkDpx+DPF
Malware Config
Extracted
Family
stealc
Botnet
sila
C2
http://85.28.47.31
Attributes
-
url_path
/5499d72b3a3e55be.php
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1436 1756 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 12922⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1756 -ip 17561⤵PID:2524