Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
Wasper Setup/WasperApp.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Wasper Setup/WasperApp.exe
Resource
win10v2004-20240802-en
General
-
Target
Wasper Setup/WasperApp.exe
-
Size
305KB
-
MD5
7ca72d437db41745f139d1228b8d95e1
-
SHA1
810a931dec45e63d8d24448d44b1bb645a71047c
-
SHA256
dbb99b36387720cd0b997359da33ecdaab55cb68cf9643b34d9d6bc136a3805b
-
SHA512
9e3e10ac4b96191cbde207b69d0c0412fe4f312da59359b66807e319d0529c9851213d7ea2ffab6346343bf59dfe4288754e97d2b76b79f6171361dd4bd083e8
-
SSDEEP
3072:KefQZKfOC31VwyY9egNtfNjJvjmqqF7Hb/LMm5M4Dfq8TDZ:KDewyY9egLRePYm5re8T
Malware Config
Extracted
stealc
wasp2
http://45.152.112.103
-
url_path
/1cf3aa1810feeb67.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 4 IoCs
resource yara_rule behavioral2/files/0x0009000000023701-3.dat family_hijackloader behavioral2/memory/1776-6-0x0000000000400000-0x0000000000582000-memory.dmp family_hijackloader behavioral2/files/0x0009000000023702-105.dat family_hijackloader behavioral2/memory/3108-106-0x0000000000B60000-0x000000000135C000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1480 created 3124 1480 explorer.exe 51 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1776 snss1.exe 3108 snss2.exe -
Loads dropped DLL 2 IoCs
pid Process 2488 explorer.exe 2488 explorer.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1776 set thread context of 4972 1776 snss1.exe 95 PID 3108 set thread context of 3588 3108 snss2.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snss1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snss2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5088 timeout.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1776 snss1.exe 1776 snss1.exe 1776 snss1.exe 4972 cmd.exe 4972 cmd.exe 4972 cmd.exe 4972 cmd.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 2488 explorer.exe 3108 snss2.exe 3108 snss2.exe 3588 cmd.exe 3588 cmd.exe 1480 explorer.exe 1480 explorer.exe 1656 openwith.exe 1656 openwith.exe 1656 openwith.exe 1656 openwith.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1776 snss1.exe 4972 cmd.exe 3108 snss2.exe 3588 cmd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 WasperApp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3108 snss2.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1776 2312 WasperApp.exe 93 PID 2312 wrote to memory of 1776 2312 WasperApp.exe 93 PID 2312 wrote to memory of 1776 2312 WasperApp.exe 93 PID 1776 wrote to memory of 4972 1776 snss1.exe 95 PID 1776 wrote to memory of 4972 1776 snss1.exe 95 PID 1776 wrote to memory of 4972 1776 snss1.exe 95 PID 1776 wrote to memory of 4972 1776 snss1.exe 95 PID 4972 wrote to memory of 2488 4972 cmd.exe 99 PID 4972 wrote to memory of 2488 4972 cmd.exe 99 PID 4972 wrote to memory of 2488 4972 cmd.exe 99 PID 4972 wrote to memory of 2488 4972 cmd.exe 99 PID 2488 wrote to memory of 2732 2488 explorer.exe 101 PID 2488 wrote to memory of 2732 2488 explorer.exe 101 PID 2488 wrote to memory of 2732 2488 explorer.exe 101 PID 2732 wrote to memory of 5088 2732 cmd.exe 103 PID 2732 wrote to memory of 5088 2732 cmd.exe 103 PID 2732 wrote to memory of 5088 2732 cmd.exe 103 PID 2312 wrote to memory of 3108 2312 WasperApp.exe 104 PID 2312 wrote to memory of 3108 2312 WasperApp.exe 104 PID 2312 wrote to memory of 3108 2312 WasperApp.exe 104 PID 3108 wrote to memory of 3588 3108 snss2.exe 105 PID 3108 wrote to memory of 3588 3108 snss2.exe 105 PID 3108 wrote to memory of 3588 3108 snss2.exe 105 PID 3108 wrote to memory of 3588 3108 snss2.exe 105 PID 3588 wrote to memory of 1480 3588 cmd.exe 107 PID 3588 wrote to memory of 1480 3588 cmd.exe 107 PID 3588 wrote to memory of 1480 3588 cmd.exe 107 PID 3588 wrote to memory of 1480 3588 cmd.exe 107 PID 1480 wrote to memory of 1656 1480 explorer.exe 108 PID 1480 wrote to memory of 1656 1480 explorer.exe 108 PID 1480 wrote to memory of 1656 1480 explorer.exe 108 PID 1480 wrote to memory of 1656 1480 explorer.exe 108 PID 1480 wrote to memory of 1656 1480 explorer.exe 108
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3124
-
C:\Windows\SysWOW64\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\Wasper Setup\WasperApp.exe"C:\Users\Admin\AppData\Local\Temp\Wasper Setup\WasperApp.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\e31c096e-021c-4868-b1c6-aaec941653e1\snss1.exe"C:\Users\Admin\AppData\Local\Temp\e31c096e-021c-4868-b1c6-aaec941653e1\snss1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Windows\SysWOW64\explorer.exe" & del "C:\ProgramData\*.dll"" & exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\timeout.exetimeout /t 56⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5088
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\e31c096e-021c-4868-b1c6-aaec941653e1\snss2.exe"C:\Users\Admin\AppData\Local\Temp\e31c096e-021c-4868-b1c6-aaec941653e1\snss2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1480
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4236,i,10369132178352108590,11047993562598554317,262144 --variations-seed-version --mojo-platform-channel-handle=3740 /prefetch:81⤵PID:3588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=4188,i,10369132178352108590,11047993562598554317,262144 --variations-seed-version --mojo-platform-channel-handle=2384 /prefetch:31⤵PID:4432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
1.1MB
MD5a3302d5423f4a928b43c787f8665d4a2
SHA17c0ca5f107c6da973669baac28853d3d4f3a37dc
SHA25668bad3edff028e37b1c15cfc84455b0a6151acdee9f4b4a03db935551bdc19d3
SHA512371f8832b361c783b7b0a2f48b639f7e4a208b63b8b49142557b4661497f6ac794186332943916a34794f126ae9a848d23b4a5fefc362ea09050ba892e5019c9
-
Filesize
907KB
MD583d99d7277abf823d95d445ddc86a27e
SHA13693e4c1ff1cf9f5e3ce177ee47ae631646f3a33
SHA256d4d7a6ec297f097ebe5cd59bcfe660fa99e9976e70d0a633eb188e79daab3add
SHA51254f7602649093a84c67a0590cc924a0010ea90e7ca37f190fcfdbdeb7e9427d185ae27d9dfaf3762b95ece50af7637754cc1bb135cd8bfec04934bcdeba6a176
-
Filesize
1.5MB
MD537f39d42469f898a063f5cf9931aa5e8
SHA1eae3937c7a5c4c7e31ed84da81dee9ac03b8885f
SHA256770f6abaa4cfa395c46f7271d86553e5ebb21448a7cf38047df00535bd3463f2
SHA512424d4e3b9246df4c3f4d79e9a3b7f1b8d7f78c6c5d39f13247fe657637a426d472a08c4bd9e71c787f384020f1b60dd8db9d85961c7f01fd6d0ac69505644bee
-
Filesize
7.4MB
MD5afea68327bd3cb05fea2420848065499
SHA1e057f60b9e54b139e2fdbc63b141533c4946c8d5
SHA256039b95904c2dacfb2fd0798010837023349478dbbb9f70bf52a2f79e4735b5b4
SHA512be1c174bdbff87c38299c880ac93d4959d8048817439511bec59c281f9f1f773d501017cc52963da82ce8941eecd2cf002ed44dc34e3bd4e7ba6b8eec50c9dbb