Analysis
-
max time kernel
16s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe
Resource
win10v2004-20240910-en
General
-
Target
2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe
-
Size
327KB
-
MD5
dfd49d1326704cfeee9852999782e4b6
-
SHA1
4bd1c441c55ec55a1cac7ca2bfe786a739cb01a4
-
SHA256
2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef
-
SHA512
fe9e9537f76bf36b6e6abd340ef135d5d017bb2b067239f6871f5a8952d2a5b823dd89838b8d31a928b40a1a70bd83010e5f3f49905672fbcd74b763d65504bf
-
SSDEEP
6144:b0VDzBghICYEQ4pirMkbnahpDVD9oX8Wnde3Ka+DWYBemn1gGsvYBKKbM3itHqOk:YR6W7dUirtbMpDVD9oX8WnU3Fh+l1gsW
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2548 set thread context of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2880 2200 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2744 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 30 PID 2548 wrote to memory of 2744 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 30 PID 2548 wrote to memory of 2744 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 30 PID 2548 wrote to memory of 2744 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 30 PID 2548 wrote to memory of 2744 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 30 PID 2548 wrote to memory of 2744 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 30 PID 2548 wrote to memory of 2744 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 30 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2548 wrote to memory of 2200 2548 2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe 31 PID 2200 wrote to memory of 2880 2200 RegAsm.exe 32 PID 2200 wrote to memory of 2880 2200 RegAsm.exe 32 PID 2200 wrote to memory of 2880 2200 RegAsm.exe 32 PID 2200 wrote to memory of 2880 2200 RegAsm.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe"C:\Users\Admin\AppData\Local\Temp\2280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 2523⤵
- Program crash
PID:2880
-
-