Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe
Resource
win10v2004-20240802-en
General
-
Target
05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe
-
Size
4.1MB
-
MD5
67e8b6db3a3d5583a5cbe684159f8270
-
SHA1
21fff27a12c542129cde65b30d62e0a3bf7f938a
-
SHA256
05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5
-
SHA512
979f3e3124f1bd11c2a9f2737bb234475147b4d3ddc016eebe9bbe555faa22ffa1b22f977627cdbf7d49a4d6e76662b0cdaf21e63ec89c2a8409182b3b55d9c2
-
SSDEEP
98304:NVqahL/HcZbhauXhu+uWB2o2M1Kilm8tMwjqCsXbiDzn4R:Xp/8ZY1+uWpbBew+bbGzn4R
Malware Config
Extracted
sharpstealer
https://api.telegram.org/bot7033943272:AAEy3-KvA1Fs-OvRqrwvT_CCCGrdb1J7SuU/sendMessage?chat_id=7423795300
-
max_exfil_filesize
1.5e+06
-
proxy_port
168.235.103.57:3128
-
vime_world
false
Signatures
-
Sharp Stealer
Sharp Stealer is an infostealer first observed in 2024, based on Echelon and Umbral stealers.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 1 IoCs
pid Process 2528 windows.exe -
Loads dropped DLL 1 IoCs
pid Process 2492 05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 freegeoip.app 4 api.ipify.org 5 api.ipify.org 6 freegeoip.app -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2528 windows.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2528 windows.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2528 2492 05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe 30 PID 2492 wrote to memory of 2528 2492 05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe 30 PID 2492 wrote to memory of 2528 2492 05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe 30 PID 2492 wrote to memory of 2528 2492 05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe 30 PID 2528 wrote to memory of 1624 2528 windows.exe 31 PID 2528 wrote to memory of 1624 2528 windows.exe 31 PID 2528 wrote to memory of 1624 2528 windows.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe"C:\Users\Admin\AppData\Local\Temp\05e90b50651e280d9bb42884b8bceda3fc64925c4fa962b9b1b95eb97c3e3ed5N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2528 -s 14283⤵PID:1624
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
396KB
MD57451dac95cd97320069dd60b4bd46b4a
SHA1718d8b77706db110ea8758fb3d0f6b647e3b9fe2
SHA256a1966e46f15a2aa563e08e1f92c4aedefe5ca019db5e7033f78a38fd461a59a3
SHA512495082a54dacd011a1c0d8c66527606a632bdc08b3c89503c2f180e27d2a3fd5936833d175177e8122e8fbb0b91a74857ad3adb77090e09315b746d26362e67c