Analysis
-
max time kernel
97s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 13:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
DeadStealer.exe
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
DeadStealer.exe
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
DeadStealer.exe
-
Size
4.3MB
-
MD5
c4a908dcbd6e7e233dd9b8262c94ac39
-
SHA1
bb2a46603908e118dbbb1c74fd377f4e5427e3fe
-
SHA256
a4beca9447f15277f11843a2109ce49e0f4c69055e2c17ed60d59e24cefea82a
-
SHA512
d71213e64a4f0a2071e8d5c782debb35ddd4788c7eb0c155497f40c7b5710417ce1d7a553758edeee95bf0ca68825386da2557bda4ead95191d4b7c8515bb1aa
-
SSDEEP
98304:RkjozJ9/im8XVBKl6tmJVP2sRx/E0T7zN3HtHOIT4bNJFY3Oqt2SGuA+i1i:tzJpjS346tmJ1ds+7ptHOjBHYm9uAm
Score
7/10
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 8 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/3944-2-0x0000019DB5A90000-0x0000019DB5AB0000-memory.dmp agile_net behavioral2/memory/3944-3-0x0000019DB5AF0000-0x0000019DB5B10000-memory.dmp agile_net behavioral2/memory/3944-5-0x0000019DCFDF0000-0x0000019DCFE5E000-memory.dmp agile_net behavioral2/memory/3944-9-0x0000019DB73A0000-0x0000019DB73B0000-memory.dmp agile_net behavioral2/memory/3944-10-0x0000019DB73B0000-0x0000019DB73CE000-memory.dmp agile_net behavioral2/memory/3944-8-0x0000019DD00B0000-0x0000019DD010A000-memory.dmp agile_net behavioral2/memory/3944-6-0x0000019DB7310000-0x0000019DB731E000-memory.dmp agile_net behavioral2/memory/3944-11-0x0000019DD10A0000-0x0000019DD11EA000-memory.dmp agile_net -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 pastebin.com 13 pastebin.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer DeadStealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion DeadStealer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS DeadStealer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe 3944 DeadStealer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3944 DeadStealer.exe