Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
C4LEKI3Q.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
General
-
Target
C4LEKI3Q.exe
-
Size
206KB
-
MD5
4baa40c44c5e8b662b9bcb15495f7ea7
-
SHA1
cd51ef773947cbe51d046af337564d20a6b15796
-
SHA256
9d4fa0efa1d9bc33b44dddd6b553057240e32ef8b9bfd22761c1a2423cf34c6c
-
SHA512
d474cc14e6d06028fa889fe1f2df2945f4dddb6b5d9cd4618e204c59159daeba11addbff8d766b0d4bea71876cd88d911a08c00c5c0814aeca916391bbd223d4
-
SSDEEP
3072:bu304GAUMd+w0SLHp4o6njQJp2m2ostoRfAI3iuaU9tRHcrolKYzEO:C304GApg2p/0jQJpCo9FiuaGtEO
Malware Config
Extracted
Family
stealc
Botnet
soft
C2
https://steamcommunity.com/profiles/76561198035868993
Attributes
-
url_path
/43e1e04e93874aba.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2296 set thread context of 1368 2296 C4LEKI3Q.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2992 1368 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C4LEKI3Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 2296 wrote to memory of 1368 2296 C4LEKI3Q.exe 30 PID 1368 wrote to memory of 2992 1368 RegAsm.exe 31 PID 1368 wrote to memory of 2992 1368 RegAsm.exe 31 PID 1368 wrote to memory of 2992 1368 RegAsm.exe 31 PID 1368 wrote to memory of 2992 1368 RegAsm.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\C4LEKI3Q.exe"C:\Users\Admin\AppData\Local\Temp\C4LEKI3Q.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 2563⤵
- Program crash
PID:2992
-
-