Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe
Resource
win7-20240903-en
General
-
Target
f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe
-
Size
206KB
-
MD5
ade16b249de80c5d8a459baaac67201c
-
SHA1
8c795c6c18b99b90d23128413147a160ce0ca78c
-
SHA256
f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d
-
SHA512
2fb2d8adf690d2abe5476337f05f79c9a9a0b04f409e37d40fa004e2145826590fe91c4bfefdd14f2d826689e9eccb14e55efe60dd3063ac8a6285c9637fb573
-
SSDEEP
6144:7KDAfd+iDttV/vPJ64KE82nH/VkaAZbEO:7KD0ogttVfJ64KElH/3AZbEO
Malware Config
Extracted
stealc
default
http://147.45.47.137
-
url_path
/6ecdc9436941ebbd.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2084 set thread context of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 1792 2460 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2084 wrote to memory of 2460 2084 f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe 32 PID 2460 wrote to memory of 1792 2460 RegAsm.exe 33 PID 2460 wrote to memory of 1792 2460 RegAsm.exe 33 PID 2460 wrote to memory of 1792 2460 RegAsm.exe 33 PID 2460 wrote to memory of 1792 2460 RegAsm.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe"C:\Users\Admin\AppData\Local\Temp\f70af1ea3e7ee9af7e45f56d107c95f5ced56d0811f1a6f30c936ca7a0175a3d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 2523⤵
- Program crash
PID:1792
-
-