Analysis
-
max time kernel
23s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe
-
Size
4.1MB
-
MD5
f6bdb0cefd4ca2a9434b06209e8cc1b0
-
SHA1
388143051950d52623a344c55374a0475d989399
-
SHA256
48f335a436377ecd29c32a3f7790f4ad433bab2cd9105dd14a306b518e2ca312
-
SHA512
760e8f37ee2c79c13f8d2998fbcd35995ecb16503eb4fc6a0ffda9ee3f2dfff0dab2e26cde55394af10781cc099eadce77c46d71a84bc755e97943946071dcc1
-
SSDEEP
98304:ECc2wTe2PmtPM0jaeORJL1yKWe2i6fv34XkoG44nIMi1vycjUuyO26:EC700qXL1ueKfQXelI2yUKN
Malware Config
Extracted
sharpstealer
https://api.telegram.org/bot7190885870:AAHYSkoef0HEA3D0nTDOMHDqdBh3WW8pb1U/sendMessage?chat_id=6345674054
-
max_exfil_filesize
1.5e+06
-
proxy_port
168.235.103.57:3128
-
vime_world
false
Signatures
-
Sharp Stealer
Sharp Stealer is an infostealer first observed in 2024, based on Echelon and Umbral stealers.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
pid Process 2788 windows.exe -
Loads dropped DLL 1 IoCs
pid Process 1904 f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org 6 freegeoip.app 7 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2788 windows.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2788 windows.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2788 1904 f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe 31 PID 1904 wrote to memory of 2788 1904 f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe 31 PID 1904 wrote to memory of 2788 1904 f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe 31 PID 1904 wrote to memory of 2788 1904 f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe 31 PID 2788 wrote to memory of 1876 2788 windows.exe 32 PID 2788 wrote to memory of 1876 2788 windows.exe 32 PID 2788 wrote to memory of 1876 2788 windows.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe"C:\Users\Admin\AppData\Local\Temp\f6bdb0cefd4ca2a9434b06209e8cc1b0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2788 -s 15043⤵PID:1876
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
396KB
MD5ac41676c6d1777b33bf5003e666ee6bb
SHA1ee074b5b8f450b2c2eb5fddcc3a2421e43064e22
SHA256029e70c35cf8003b655f5f243139012580f7262b1314c3c9f6dfca4ce6178abd
SHA512805f5d91fcbd7d9e58664597813ad8eadc6bba25d6de1dc4610be0b28b55541ed7d7ca74e73567f011bc1897db73abec29c976ba54ba0d564ff17e36381821e2