Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe
Resource
win7-20240704-en
General
-
Target
86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe
-
Size
206KB
-
MD5
ab68db6a238464a75b669938a3512ae1
-
SHA1
48a7e2ed179d29d783d55fe610598474825bdf95
-
SHA256
86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5
-
SHA512
b811a8f5d3d2fab469a97a9a0d59d6b132b4fecbc7048dd203d25c938e7047b487e9a85799f8d9b04c0e01f307f3ff1bd0c3af967a8813c3ab0d72c69650364c
-
SSDEEP
6144:DYwI7yviKKJGngBT7nI5n6gtJuMM2lxG5IvjKEO:DYwIueBT7IRntJuMPXZKEO
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2544 2488 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 1700 wrote to memory of 2488 1700 86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe 31 PID 2488 wrote to memory of 2544 2488 RegAsm.exe 32 PID 2488 wrote to memory of 2544 2488 RegAsm.exe 32 PID 2488 wrote to memory of 2544 2488 RegAsm.exe 32 PID 2488 wrote to memory of 2544 2488 RegAsm.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe"C:\Users\Admin\AppData\Local\Temp\86bb9a397e62d756578dbe6c40cc07050f2066db6fb5d54499e03469a7cdccd5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2488 -s 2523⤵
- Program crash
PID:2544
-
-