Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe
Resource
win7-20240729-en
General
-
Target
743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe
-
Size
207KB
-
MD5
cd6646d9eddb6ed8900b5bd9da0597f2
-
SHA1
d87cb53b2b10d804721c80894bccbc989df5acae
-
SHA256
743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24
-
SHA512
39060c059137fd3fd00405043e97608481bf2035090a0f5aafebec84975c701296e9227f3e61977a14d9767830be4cdf1b2fd36c443643b73ec135f438b8a8b6
-
SSDEEP
3072:yUd26oMw93Ix61HeP3OYfMylQR3iVhMQzQOKYTQ6GFaAio+qrOeJFhc7aKIC+zcX:9b+ZebiQkCQj0Lde6OKIPcOwDEO
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1820 set thread context of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 2220 1688 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1820 wrote to memory of 1688 1820 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe 29 PID 1688 wrote to memory of 2220 1688 RegAsm.exe 30 PID 1688 wrote to memory of 2220 1688 RegAsm.exe 30 PID 1688 wrote to memory of 2220 1688 RegAsm.exe 30 PID 1688 wrote to memory of 2220 1688 RegAsm.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe"C:\Users\Admin\AppData\Local\Temp\743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 2523⤵
- Program crash
PID:2220
-
-