Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240705-en
5 signatures
150 seconds
General
-
Target
file.exe
-
Size
206KB
-
MD5
f6b3d422501a566c90a133b3fea8d506
-
SHA1
00b2c07e6da9107fe140d7f6762fe3087442c55b
-
SHA256
144e8f7fe9322aee4706e0496dd19ac65427a254eeab07130bdd9d4dd4186098
-
SHA512
c6844eed98fc8071b351a74af06c3a8be5b1acbd914884813871a5f31afb19944147263da604634b5005a6de7100c4873de0c6a2a232cbcc9e575bc006e60242
-
SSDEEP
3072:d3g5D9wZiRI0+Kgu3PyTDDp9XVqAFiRV/hb0qhjDy4mtmY5Kwo8Op948r+A1KhHw:9g5D9wEhLgu34gAFiRXhSxtEyhoEO
Malware Config
Extracted
Family
stealc
Botnet
nord
C2
http://185.215.113.100
Attributes
-
url_path
/e2b1563c6670f193.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3036 set thread context of 2684 3036 file.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2656 2684 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 3036 wrote to memory of 2684 3036 file.exe 30 PID 2684 wrote to memory of 2656 2684 RegAsm.exe 31 PID 2684 wrote to memory of 2656 2684 RegAsm.exe 31 PID 2684 wrote to memory of 2656 2684 RegAsm.exe 31 PID 2684 wrote to memory of 2656 2684 RegAsm.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 2523⤵
- Program crash
PID:2656
-
-