Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 19:31

General

  • Target

    3032-0-0x0000000000CC0000-0x000000000135F000-memory.exe

  • Size

    6.6MB

  • MD5

    cb5ef9a17aee5dd9a9a7349c17493a72

  • SHA1

    62ca64c31ca37b16a6c554ec22cd5957f23aa0b0

  • SHA256

    4afd1ead3eb8ca30bd2c30bb03db2534944fc773c7e2b5a5b8c0beac660f5254

  • SHA512

    c619e1bd5d937a9c40e71d75c259ab898dfb1e6d6221fb5b35041a65a1c5c8f47e049c665b316677a8fd6a51e3819213881d4412c876654414fb22389ded5ced

  • SSDEEP

    3072:N2AHZ2DBoQrqqomKmU2Kff63R4mP6uj7IqZSKE2T4vLsdVzD:Nr09oYqqomKmUdfG1T/IR2T4vLszD

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3032-0-0x0000000000CC0000-0x000000000135F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\3032-0-0x0000000000CC0000-0x000000000135F000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 36
      2⤵
      • Program crash
      PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2404-0-0x00000000007B0000-0x0000000000E4F000-memory.dmp

    Filesize

    6.6MB