Analysis

  • max time kernel
    142s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 21:12

General

  • Target

    observer (3)05.exe

  • Size

    368KB

  • MD5

    0160251d7bd26c489df555fbe24dd9be

  • SHA1

    08a8fb714b35750f3bdde61171b93590c1955f12

  • SHA256

    89ca8d8ad85b97f47fbd5f9e3bd70168b6ca6e7ca1f56df7990b44acc3522815

  • SHA512

    430eb4c9224abe0b7f54c4a4d7d473aef6e4fe72de38bedfb6e54dcda2544819f211bd85f679505455b27173b8322f26cdd410fa25528f7e6606b73897bf8b50

  • SSDEEP

    6144:NynF+dLobizEYd7DVlEfyxhRb0HzKo6BP6B8dZft1iBVBDG5:HdL+iz5FDVlEqhRb0He5EFBVBE

Malware Config

Extracted

Family

observer

C2

http://91.103.252.17:8912

Signatures

  • Observer

    Observer is an infostealer written in C++.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\observer (3)05.exe
    "C:\Users\Admin\AppData\Local\Temp\observer (3)05.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4092
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 1204
      2⤵
      • Program crash
      PID:3764
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4092 -ip 4092
    1⤵
      PID:4516

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4092-0-0x00000000021B0000-0x00000000021FB000-memory.dmp

      Filesize

      300KB

    • memory/4092-5-0x00007FFF60990000-0x00007FFF60B85000-memory.dmp

      Filesize

      2.0MB

    • memory/4092-6-0x00007FFF60990000-0x00007FFF60B85000-memory.dmp

      Filesize

      2.0MB

    • memory/4092-7-0x00000000021B0000-0x00000000021FB000-memory.dmp

      Filesize

      300KB