Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
e826e5dda653e04af408850d34bcde30N.exe
Resource
win7-20240705-en
General
-
Target
e826e5dda653e04af408850d34bcde30N.exe
-
Size
206KB
-
MD5
e826e5dda653e04af408850d34bcde30
-
SHA1
ef68ca7be13805e1a4ce73320015567df98b07ff
-
SHA256
bdf3491c9a75b80277746b1d6c105da79a3b5fba637236b87dd4af15af33e3b2
-
SHA512
c2750171b88c7d138299b29341af7cd20d97c2a22f6cb82b5e7711cc28f7947ac943fbf9ba8c038f49678b1b38d6a752706242786ed627fa69db267690da3072
-
SSDEEP
3072:NL3cC9msn+i+bGNEo51Fm4V2o5Y9ZC37VksN7MYpwyMCDzQRgUAsPA7TKYzEO:NL3cdct+nE2mY9ClN5StsUAREO
Malware Config
Extracted
stealc
kora
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1368 set thread context of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2508 2584 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e826e5dda653e04af408850d34bcde30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 1368 wrote to memory of 2584 1368 e826e5dda653e04af408850d34bcde30N.exe 30 PID 2584 wrote to memory of 2508 2584 RegAsm.exe 31 PID 2584 wrote to memory of 2508 2584 RegAsm.exe 31 PID 2584 wrote to memory of 2508 2584 RegAsm.exe 31 PID 2584 wrote to memory of 2508 2584 RegAsm.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e826e5dda653e04af408850d34bcde30N.exe"C:\Users\Admin\AppData\Local\Temp\e826e5dda653e04af408850d34bcde30N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 2523⤵
- Program crash
PID:2508
-
-