Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 21:11

General

  • Target

    observer (1)01.exe

  • Size

    371KB

  • MD5

    e9dda8ccde5385e8d0a7f0bdc361e51d

  • SHA1

    863734caf0cb94dce610fe49eeebe438a7096dfb

  • SHA256

    5b2b8a4d5b8375a3ac2ce68b93cdbfdc8fd13d1cf4ea1a6a61bd784aa495dbfb

  • SHA512

    960cbd75e519bd4593b3d313834abe687dfd7de58b22d65384e27262598508f20b2d14d8fa5ceda422287495f5a75ccf494db69e61a96ca34aa12f870d1c7d93

  • SSDEEP

    6144:UvIAage6geI62bhgkHWdVwVZN42ZApv5Fd3MkHg/rRq9/fbsMS2GFjOw:m2ReyKkHWjwVZpZoDdQ0LW

Malware Config

Extracted

Family

observer

C2

http://5.42.66.25:3000

Signatures

  • Observer

    Observer is an infostealer written in C++.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\observer (1)01.exe
    "C:\Users\Admin\AppData\Local\Temp\observer (1)01.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3948
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 1276
      2⤵
      • Program crash
      PID:1324
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3948 -ip 3948
    1⤵
      PID:3784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3948-0-0x0000000002060000-0x00000000020A4000-memory.dmp

      Filesize

      272KB

    • memory/3948-5-0x0000000002060000-0x00000000020A4000-memory.dmp

      Filesize

      272KB