Analysis
-
max time kernel
43s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 19:52
Behavioral task
behavioral1
Sample
fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe
Resource
win11-20240802-en
General
-
Target
fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe
-
Size
1.6MB
-
MD5
f3ec92776e756b393a09b1af72f697c8
-
SHA1
edc146728bc006b76094dd1d21a8217e612bef0f
-
SHA256
fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607
-
SHA512
32ca2c0d48427d5890e3e0af419f554528d9c29b143f4fa19369298a05d05be393914cb602e9069735f8c24793ae2687c773e11954246313f427d0f3135a065d
-
SSDEEP
49152:C85F9jLrmRlBprqFOFtTEO+iaFsvVjrB:C81jPsl32FOrEnF
Malware Config
Signatures
-
Detects Fredy Stealer Payload 7 IoCs
Fredy Stealer is an infostealer written in C++.
resource yara_rule behavioral2/memory/5068-0-0x00000000007E0000-0x0000000000B19000-memory.dmp family_fredy behavioral2/memory/5068-3-0x00000000007E0000-0x0000000000B19000-memory.dmp family_fredy behavioral2/memory/5068-2-0x00000000007E0000-0x0000000000B19000-memory.dmp family_fredy behavioral2/memory/5068-1-0x00000000007E0000-0x0000000000B19000-memory.dmp family_fredy behavioral2/memory/5068-4-0x00000000007E0000-0x0000000000B19000-memory.dmp family_fredy behavioral2/memory/5068-15-0x00000000007E0000-0x0000000000B19000-memory.dmp family_fredy behavioral2/memory/5068-63-0x00000000007E0000-0x0000000000B19000-memory.dmp family_fredy -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
pid Process 2740 Activator.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe File opened (read-only) \??\F: fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 46 ipinfo.io 18 ipinfo.io 19 ipinfo.io 44 ipinfo.io -
Program crash 1 IoCs
pid pid_target Process procid_target 456 5068 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Activator.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2740 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 91 PID 5068 wrote to memory of 2740 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 91 PID 5068 wrote to memory of 2740 5068 fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe"C:\Users\Admin\AppData\Local\Temp\fb240f8a4aa481c107c8dc11f1831558f109838f7e887247383fca779f562607.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\Activator.exe"C:\Users\Admin\AppData\Local\Temp\Activator.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 11042⤵
- Program crash
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5068 -ip 50681⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD52b2204c85f334de4695369f631926664
SHA1f2704bd77341c26f3217cde9d9458b072a550f34
SHA25669db6b1262af756060efd63ca54a933cbec740ac193221a88bbc46df9ac53de9
SHA512e7cfd3d263cb93e06470279fc22fac243080619a12490ba2c3daaeda0cf6b74da095129d38db3180b1c3478d30f96ae8701bb684cca44e40993efeba620aa019