Analysis
-
max time kernel
104s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
e826e5dda653e04af408850d34bcde30N.exe
Resource
win7-20240705-en
General
-
Target
e826e5dda653e04af408850d34bcde30N.exe
-
Size
206KB
-
MD5
e826e5dda653e04af408850d34bcde30
-
SHA1
ef68ca7be13805e1a4ce73320015567df98b07ff
-
SHA256
bdf3491c9a75b80277746b1d6c105da79a3b5fba637236b87dd4af15af33e3b2
-
SHA512
c2750171b88c7d138299b29341af7cd20d97c2a22f6cb82b5e7711cc28f7947ac943fbf9ba8c038f49678b1b38d6a752706242786ed627fa69db267690da3072
-
SSDEEP
3072:NL3cC9msn+i+bGNEo51Fm4V2o5Y9ZC37VksN7MYpwyMCDzQRgUAsPA7TKYzEO:NL3cdct+nE2mY9ClN5StsUAREO
Malware Config
Extracted
stealc
kora
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4252 set thread context of 3940 4252 e826e5dda653e04af408850d34bcde30N.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e826e5dda653e04af408850d34bcde30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4252 wrote to memory of 3940 4252 e826e5dda653e04af408850d34bcde30N.exe 86 PID 4252 wrote to memory of 3940 4252 e826e5dda653e04af408850d34bcde30N.exe 86 PID 4252 wrote to memory of 3940 4252 e826e5dda653e04af408850d34bcde30N.exe 86 PID 4252 wrote to memory of 3940 4252 e826e5dda653e04af408850d34bcde30N.exe 86 PID 4252 wrote to memory of 3940 4252 e826e5dda653e04af408850d34bcde30N.exe 86 PID 4252 wrote to memory of 3940 4252 e826e5dda653e04af408850d34bcde30N.exe 86 PID 4252 wrote to memory of 3940 4252 e826e5dda653e04af408850d34bcde30N.exe 86 PID 4252 wrote to memory of 3940 4252 e826e5dda653e04af408850d34bcde30N.exe 86 PID 4252 wrote to memory of 3940 4252 e826e5dda653e04af408850d34bcde30N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e826e5dda653e04af408850d34bcde30N.exe"C:\Users\Admin\AppData\Local\Temp\e826e5dda653e04af408850d34bcde30N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3940
-