Analysis
-
max time kernel
27s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
stellar (2).rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
stellar (2).rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
setllar/output/build/CHunDTf7Tuu6ztdelc1A0IFBtyk2bO.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
setllar/output/build/CHunDTf7Tuu6ztdelc1A0IFBtyk2bO.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
setllar/output/build/VMProtectSDK64.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
setllar/output/build/VMProtectSDK64.dll
Resource
win10v2004-20240802-en
General
-
Target
stellar (2).rar
-
Size
51.1MB
-
MD5
a6eb6b9d2c1a900cb1813c1bed769f5e
-
SHA1
7816a6e2e3534927a0ab7e179129873e99b712fb
-
SHA256
bdd6beb0071ce8380076fc6bf4df9b17a5929f2ff7ca97abfc8157127de09f28
-
SHA512
863c0617bed8bdf8db990d2e1a954107c2c44d34141d4546247b1e588e7efc133361fdc951f3189ddc57dff4729b05b36afa162092776d8b03a30ae2e1db3bde
-
SSDEEP
1572864:g0H/H5JzXTT4qVcqy2gnK6d9PKx23vsUd6dTgpbGk4G:gqP/jT4qmPdK6d9PIIvv6dTgp+G
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2568 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2968 1292 cmd.exe 30 PID 1292 wrote to memory of 2968 1292 cmd.exe 30 PID 1292 wrote to memory of 2968 1292 cmd.exe 30 PID 2968 wrote to memory of 2568 2968 rundll32.exe 31 PID 2968 wrote to memory of 2568 2968 rundll32.exe 31 PID 2968 wrote to memory of 2568 2968 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\stellar (2).rar"1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\stellar (2).rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\stellar (2).rar3⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2568
-
-