Analysis
-
max time kernel
10s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 07:39
Behavioral task
behavioral1
Sample
stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
stealer.exe
Resource
win10v2004-20240802-en
General
-
Target
stealer.exe
-
Size
6.0MB
-
MD5
e59cea939446d6c203b80eb6487d0705
-
SHA1
c912d930360ffd2bf5ff8d79834474be94d91849
-
SHA256
34e30b18fd4482861916227495ef07e817252cc74571e9eb081e71c07118e969
-
SHA512
74dbdc05d267bdb8bcb4088d691eae0cc66f508e4f3bdd5b6b43a26e1f435f1a2a571a3f974f2332c615e342b179de6c379807580ab0fe448b8d907a58fb7c07
-
SSDEEP
98304:gl6sdECBCgVQWJuhswoYv5eOaVczo0Ahd6y0Naxxv8fqDDAx5rlcgVeRWHtw9ust:gl3/CguWJysVYvsO5oyMxxvjDDAx5rl2
Malware Config
Signatures
-
Loads dropped DLL 23 IoCs
pid Process 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe 2664 stealer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2664 2700 stealer.exe 30 PID 2700 wrote to memory of 2664 2700 stealer.exe 30 PID 2700 wrote to memory of 2664 2700 stealer.exe 30 PID 2664 wrote to memory of 428 2664 stealer.exe 31 PID 2664 wrote to memory of 428 2664 stealer.exe 31 PID 2664 wrote to memory of 428 2664 stealer.exe 31 PID 2664 wrote to memory of 428 2664 stealer.exe 31 PID 2664 wrote to memory of 428 2664 stealer.exe 31 PID 2664 wrote to memory of 428 2664 stealer.exe 31 PID 2664 wrote to memory of 428 2664 stealer.exe 31 PID 2664 wrote to memory of 428 2664 stealer.exe 31 PID 2664 wrote to memory of 428 2664 stealer.exe 31 PID 2664 wrote to memory of 2148 2664 stealer.exe 32 PID 2664 wrote to memory of 2148 2664 stealer.exe 32 PID 2664 wrote to memory of 2148 2664 stealer.exe 32 PID 2664 wrote to memory of 2148 2664 stealer.exe 32 PID 2664 wrote to memory of 2148 2664 stealer.exe 32 PID 2664 wrote to memory of 2148 2664 stealer.exe 32 PID 2664 wrote to memory of 2148 2664 stealer.exe 32 PID 2664 wrote to memory of 2148 2664 stealer.exe 32 PID 2664 wrote to memory of 2148 2664 stealer.exe 32 PID 2664 wrote to memory of 2228 2664 stealer.exe 33 PID 2664 wrote to memory of 2228 2664 stealer.exe 33 PID 2664 wrote to memory of 2228 2664 stealer.exe 33 PID 2664 wrote to memory of 2228 2664 stealer.exe 33 PID 2664 wrote to memory of 2228 2664 stealer.exe 33 PID 2664 wrote to memory of 2228 2664 stealer.exe 33 PID 2664 wrote to memory of 2228 2664 stealer.exe 33 PID 2664 wrote to memory of 2228 2664 stealer.exe 33 PID 2664 wrote to memory of 2228 2664 stealer.exe 33 PID 2664 wrote to memory of 2792 2664 stealer.exe 34 PID 2664 wrote to memory of 2792 2664 stealer.exe 34 PID 2664 wrote to memory of 2792 2664 stealer.exe 34 PID 2664 wrote to memory of 2792 2664 stealer.exe 34 PID 2664 wrote to memory of 2792 2664 stealer.exe 34 PID 2664 wrote to memory of 2792 2664 stealer.exe 34 PID 2664 wrote to memory of 2792 2664 stealer.exe 34 PID 2664 wrote to memory of 2792 2664 stealer.exe 34 PID 2664 wrote to memory of 2792 2664 stealer.exe 34 PID 2664 wrote to memory of 2212 2664 stealer.exe 35 PID 2664 wrote to memory of 2212 2664 stealer.exe 35 PID 2664 wrote to memory of 2212 2664 stealer.exe 35 PID 2664 wrote to memory of 2212 2664 stealer.exe 35 PID 2664 wrote to memory of 2212 2664 stealer.exe 35 PID 2664 wrote to memory of 2212 2664 stealer.exe 35 PID 2664 wrote to memory of 2212 2664 stealer.exe 35 PID 2664 wrote to memory of 2212 2664 stealer.exe 35 PID 2664 wrote to memory of 2212 2664 stealer.exe 35 PID 2664 wrote to memory of 1496 2664 stealer.exe 36 PID 2664 wrote to memory of 1496 2664 stealer.exe 36 PID 2664 wrote to memory of 1496 2664 stealer.exe 36 PID 2664 wrote to memory of 1496 2664 stealer.exe 36 PID 2664 wrote to memory of 1496 2664 stealer.exe 36 PID 2664 wrote to memory of 1496 2664 stealer.exe 36 PID 2664 wrote to memory of 1496 2664 stealer.exe 36 PID 2664 wrote to memory of 1496 2664 stealer.exe 36 PID 2664 wrote to memory of 1496 2664 stealer.exe 36 PID 2664 wrote to memory of 1060 2664 stealer.exe 37 PID 2664 wrote to memory of 1060 2664 stealer.exe 37 PID 2664 wrote to memory of 1060 2664 stealer.exe 37 PID 2664 wrote to memory of 1060 2664 stealer.exe 37 PID 2664 wrote to memory of 1060 2664 stealer.exe 37 PID 2664 wrote to memory of 1060 2664 stealer.exe 37 PID 2664 wrote to memory of 1060 2664 stealer.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\stealer.exe"C:\Users\Admin\AppData\Local\Temp\stealer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\stealer.exe"C:\Users\Admin\AppData\Local\Temp\stealer.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:428
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2148
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2228
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2792
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2212
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:1496
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:1060
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2816
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:1036
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2340
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2144
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2092
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2216
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2312
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:1140
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2928
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2108
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2316
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:932
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:1264
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:616
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:2684
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:1088
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:1656
-
-
C:\Windows\system32\winlogon.exewinlogon.exe3⤵PID:824
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD50e675d4a7a5b7ccd69013386793f68eb
SHA16e5821ddd8fea6681bda4448816f39984a33596b
SHA256bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66
-
Filesize
120KB
MD5f1e33a8f6f91c2ed93dc5049dd50d7b8
SHA123c583dc98aa3f6b8b108db5d90e65d3dd72e9b4
SHA2569459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4
SHA512229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5
-
Filesize
12KB
MD549e3260ae3f973608f4d4701eb97eb95
SHA1097e7d56c3514a3c7dc17a9c54a8782c6d6c0a27
SHA256476fbad616e20312efc943927ade1a830438a6bebb1dd1f83d2370e5343ea7af
SHA512df22cf16490faa0dc809129ca32eaf1a16ec665f9c5411503ce0153270de038e5d3be1e0e49879a67043a688f6c42bdb5a9a6b3cea43bf533eba087e999be653
-
Filesize
12KB
MD57f14fd0436c066a8b40e66386ceb55d0
SHA1288c020fb12a4d8c65ed22a364b5eb8f4126a958
SHA256c78eab8e057bddd55f998e72d8fdf5b53d9e9c8f67c8b404258e198eb2cdcf24
SHA512d04adc52ee0ceed4131eb1d133bfe9a66cbc0f88900270b596116064480afe6ae6ca42feb0eaed54cb141987f2d7716bb2dae947a025014d05d7aa0b0821dc50
-
Filesize
15KB
MD571457fd15de9e0b3ad83b4656cad2870
SHA1c9c2caf4f9e87d32a93a52508561b4595617f09f
SHA256db970725b36cc78ef2e756ff4b42db7b5b771bfd9d106486322cf037115bd911
SHA512a10fcf1d7637effff0ae3e3b4291d54cc7444d985491e82b3f4e559fbb0dbb3b6231a8c689ff240a5036a7acae47421cda58aaa6938374d4b84893cce0077bc8
-
Filesize
13KB
MD5e93816c04327730d41224e7a1ba6dc51
SHA13f83b9fc6291146e58afce5b5447cd6d2f32f749
SHA256ca06ccf12927ca52d8827b3a36b23b6389c4c6d4706345e2d70b895b79ff2ec8
SHA512beaab5a12bfc4498cdf67d8b560ef0b0e2451c5f4634b6c5780a857666fd14f8a379f42e38be1beefa1c3578b2df913d901b271719ac6794bfaab0731bb77bca
-
Filesize
13KB
MD5acf40d5e6799231cf7e4026bad0c50a0
SHA18f0395b7e7d2aac02130f47b23b50d1eab87466b
SHA25664b5b95fe56b6df4c2d47d771bec32bd89267605df736e08c1249b802d6d48d1
SHA512f66a61e89231b6dc95b26d97f5647da42400bc809f70789b9afc00a42b94ea3487913860b69a1b0ee59ed5eb62c3a0cade9e21f95da35fdd42d8ce51c5507632
-
Filesize
16KB
MD5d66741472c891692054e0bac6dde100b
SHA14d7927e5bea5cac77a26dc36b09d22711d532c61
SHA256252b14d09b0ea162166c50e41aea9c6f6ad8038b36701981e48edff615d3ed4b
SHA512c5af302f237c436ac8fe42e0e017d9ed039b4c6a25c3772059f0a6929cba3633d690d1f84ab0460beb24a0704e2e1fe022e0e113780c6f92e3d38d1afa8cee95
-
Filesize
13KB
MD5841cb7c4ba59f43b5b659dd3dfe02cd2
SHA15f81d14c98a7372191eceb65427f0c6e9f4ed5fa
SHA2562eafce6ff69a237b17ae004f1c14241c3144be9eaeb4302fdc10dd1cb07b7673
SHA512f446acb304960ba0d262d8519e1da6fe9263cc5a9da9ac9b92b0ac2ce8b3b90a4fd9d1fdfe7918b6a97afe62586a36abd8e8e18076d3ad4ad77763e901065914
-
Filesize
13KB
MD5a404e8ecee800e8beda84e8733a40170
SHA197a583e8b4bbcdaa98bae17db43b96123c4f7a6a
SHA25680c291e9fcee694f03d105ba903799c79a546f2b5389ecd6349539c323c883aa
SHA51266b99f5f2dcb698137ecbc5e76e5cf9fe39b786ea760926836598cabbfa6d7a27e2876ec3bf424a8cbb37e475834af55ef83abb2ed3c9d72c6a774c207cff0e0
-
Filesize
21KB
MD5ccf0a6129a16068a7c9aa3b0b7eeb425
SHA1ea2461ab0b86c81520002ab6c3b5bf44205e070c
SHA25680c09eb650cf3a913c093e46c7b382e2d7486fe43372c4bc00c991d2c8f07a05
SHA512d4f2285c248ace34ea9192e23b3e82766346856501508a7a7fc3e6d07ee05b1e57ad033b060fe0cc24ee8dc61f97757b001f5261da8e063ab21ee80e323a306e
-
Filesize
13KB
MD5e62a28c67a222b5af736b6c3d68b7c82
SHA12214b0229f5ffc17e65db03b085b085f4af9d830
SHA256bd475e0c63ae3f59ea747632ab3d3a17dd66f957379fa1d67fa279718e9cd0f4
SHA5122f3590d061492650ee55a7ce8e9f1d836b7bb6976ae31d674b5acf66c30a86a5c92619d28165a4a6c9c3d158bb57d764ee292440a3643b4e23cffcdb16de5097
-
Filesize
17KB
MD583433288a21ff0417c5ba56c2b410ce8
SHA1b94a4ab62449bca8507d70d7fb5cbc5f5dfbf02c
SHA256301c5418d2aee12b6b7c53dd9332926ce204a8351b69a84f8e7b8a1344fa7ea1
SHA512f20de6248d391f537dcc06e80174734cdd1a47dc67e47f903284d48fb7d8082af4eed06436365fce3079aac5b4e07bbd9c1a1a5eb635c8fe082a59f566980310
-
Filesize
18KB
MD5844e18709c2deda41f2228068a8d2ced
SHA1871bf94a33fa6bb36fa1332f8ec98d8d3e6fe3b6
SHA256799e9174163f5878bea68ca9a6d05c0edf375518e7cc6cc69300c2335f3b5ea2
SHA5123bbb82d79f54d85dcbe6ee85a9909c999b760a09e8925d704a13ba18c0a610a97054ac8bd4c66c1d52ab08a474eda78542d5d79ae036f2c8e1f1e584f5122945
-
Filesize
18KB
MD55a82c7858065335cad14fb06f0465c7e
SHA1c5804404d016f64f3f959973eaefb7820edc97ad
SHA2563bf407f8386989aa5f8c82525c400b249e6f8d946a32f28c469c996569d5b2e3
SHA51288a06e823f90ef32d62794dafe6c3e92755f1f1275c8192a50e982013a56cf58a3ba39e2d80b0dd5b56986f2a7d4c5b047a75f8d8f4b5b241cdf2d00beebd0d5
-
Filesize
15KB
MD5b64b9e13c90f84d0b522cd0645c2100c
SHA139822cb8f0914a282773e4218877168909fdc18d
SHA2562f6b0f89f4d680a9a9994d08aa5cd514794be584a379487906071756ac644bd6
SHA5129cb03d1120de577bdb9ed720c4ec8a0b89db85969b74fbd900dcdc00cf85a78d9469290a5a5d39be3691cb99d49cf6b84569ac7669a798b1e9b6c71047b350de
-
Filesize
1003KB
MD547dda01b3f3799c44a68bc93ed895a47
SHA1aa2adfb109ea622c9bd46a5493aec49e915ca75b
SHA2567ffd6a4e7574f52f62285b3e5c3316dd87abb2f0aac7319e3edc32709fd67bf3
SHA512628554c15dc29f6addd5180697943511d1975a010474b580daeaf430486d71162bd4d70107fc5d623a08e1df10189a9ca894549992845affe703921aa365e526
-
Filesize
32KB
MD54424baf6ed5340df85482fa82b857b03
SHA1181b641bf21c810a486f855864cd4b8967c24c44
SHA2568c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79
SHA5128adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33
-
Filesize
4.0MB
MD5d2a8a5e7380d5f4716016777818a32c5
SHA1fb12f31d1d0758fe3e056875461186056121ed0c
SHA25659ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9
SHA512ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7
-
Filesize
31KB
MD5629f76ef6491d11b06133c37692b04d6
SHA1a55c64556929bb984906a16c3f3c2d425b0712c9
SHA25683c3532c4355dfe635df4462da7bd767d8c96bf85cb60f80072cec3cf1da24c1
SHA512f26dfa24bcc34f1958ce2f96db41f7a02ffed6577d18e07efce6ef89773604c257d709150235367e6b8866c536d679b159a6976037e02d2c8e28d321fd49c395
-
Filesize
994KB
MD58e7680a8d07c3c4159241d31caaf369c
SHA162fe2d4ae788ee3d19e041d81696555a6262f575
SHA25636cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80
SHA5129509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174
-
Filesize
13KB
MD519876c0a273c626f0e7bd28988ea290e
SHA18e7dd4807fe30786dd38dbb0daca63256178b77c
SHA25607fda71f93c21a43d836d87fee199ac2572801993f00d6628dba9b52fcb25535
SHA512cdd405f40ac1c0c27e281c4932fbbd6cc84471029d7f179ecf2e797b32bf208b3cd0ca6f702bb26f070f8cdd06b773c7beb84862e4c01794938932146e74f1ca
-
Filesize
13KB
MD50eeb09c06c6926279484c3f0fbef85e7
SHA1d074721738a1e9bb21b9a706a6097ec152e36a98
SHA25610eb78864ebff85efc91cc91804f03fcd1b44d3a149877a9fa66261286348882
SHA5123ceb44c0ca86928d2fdd75bf6442febafaca4de79108561e233030635f428539c44faae5bcf12ff6aa756c413ab7558ccc37eef8008c8aa5b37062d91f9d3613
-
Filesize
14KB
MD5a5dce38bc9a149abe5d2f61db8d6cec0
SHA105b6620f7d59d727299de77abe517210adea7fe0
SHA256a5b66647ee6794b7ee79f7a2a4a69dec304daea45a11f09100a1ab092495b14b
SHA512252f7f841907c30ff34aa63c6f996514eb962fc6e1908645da8bbde137699fe056740520fee6ad9728d1310261e6e3a212e1b69a7334832ce95da599d7742450