Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe
Resource
win7-20240903-en
General
-
Target
d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe
-
Size
206KB
-
MD5
a991933b29e1203af5c3df1d62d0b247
-
SHA1
0979ff2723370bbd48ea50d59413a1741e4edd01
-
SHA256
d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71
-
SHA512
7bde49a84b7feb8dec2330a7b83a7adc8e65ea13cb6521b267e8626c8ba10f2e383b37747b08a7df1c2aa05410ee80539aae555f8f4d0901cb4992ac16087518
-
SSDEEP
6144:9B3OtHI5KcJnfDZvlHsH8aIhvrtSPje6XTEO:9kopdlvi8aixweoEO
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1884 set thread context of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2372 2388 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 1884 wrote to memory of 2388 1884 d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe 29 PID 2388 wrote to memory of 2372 2388 RegAsm.exe 30 PID 2388 wrote to memory of 2372 2388 RegAsm.exe 30 PID 2388 wrote to memory of 2372 2388 RegAsm.exe 30 PID 2388 wrote to memory of 2372 2388 RegAsm.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe"C:\Users\Admin\AppData\Local\Temp\d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 2523⤵
- Program crash
PID:2372
-
-