Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 01:21

General

  • Target

    72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe

  • Size

    909KB

  • MD5

    5e55a47b6d7053f9d1ff19539863b8c2

  • SHA1

    0fc816248d3ee7605237b1c216dd95333f9edc44

  • SHA256

    72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545

  • SHA512

    53665b9d764a454aa5ed9f0037a4c36df169ee0fa2caf328b7b559c97006f8818cb33cdeb488333e37c266be041b8fcd4dc4aa683e69472d9c0e00850ad1807d

  • SSDEEP

    12288:ECXVJY0G8ReIqcEV/cjrk/BO27mOCNcnjaEpEEt/xOJUnjz/j/aP3hLnqZ:Eys07eFv1/4PwG/C5OKnjz/zwlnqZ

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe
    "C:\Users\Admin\AppData\Local\Temp\72c40603279789c395054781be9ae0b153ca29ebe3c2f9ff0cb609a603b5c545.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Extends Extends.bat & Extends.bat
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "wrsa opssvc"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1708
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2644
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2736
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 376615
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2764
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "PieAttachedEndlessEz" Projected
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2740
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Presence + ..\Expenditures + ..\Settlement + ..\Daniel + ..\Javascript + ..\Packs y
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2548
      • C:\Users\Admin\AppData\Local\Temp\376615\Sleeping.pif
        Sleeping.pif y
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2700
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\376615\Sleeping.pif

    Filesize

    872KB

    MD5

    18ce19b57f43ce0a5af149c96aecc685

    SHA1

    1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

    SHA256

    d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

    SHA512

    a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

  • C:\Users\Admin\AppData\Local\Temp\376615\y

    Filesize

    426KB

    MD5

    ae3d55e50e851e400c6276ea49e81e4f

    SHA1

    2447dd509e112be9d80520bcba5a0511320baaf7

    SHA256

    f64f9dfc4fce3514662636891549ab28f2314d5b5c50a12c2dcc0282cd052a8b

    SHA512

    2bb77a8b0a1e277839efe16de88852b1a23079de38ca47f4d562c11f9eb9931f4a733155137aa223b2e0c8665fd934bf52bfae700de6ca9ebc663f3aa7a46812

  • C:\Users\Admin\AppData\Local\Temp\Daniel

    Filesize

    94KB

    MD5

    dbb5b61f1db614c25d7ec9d101110a59

    SHA1

    baf31207e205d36645a0eff19e87c74be1b576ea

    SHA256

    3eb6724e3f69973f4df7a5026da55fcbe1b48b9ae0661ff79e454cde052d2381

    SHA512

    016e72fe2e3f68246e5e40e4f39e25a4ffa6ebf76d451bc71b0136768104f36a40d377456d9f5a8d5a4b49bc927e085a5677cbb1c7f67f27855b8d7c4e4948db

  • C:\Users\Admin\AppData\Local\Temp\Expenditures

    Filesize

    86KB

    MD5

    49f0222027ce9239edfe22653b2cabd4

    SHA1

    c8326622726f76cdaf79a47fadc9eb5beac32237

    SHA256

    b9921b700b9725b83e0c59c33bc14af9cc1c16a15fc5c6794fbb0225187b93ec

    SHA512

    5c4c92304713f4cbc3f08214c5b12bc056c5694c1893d6e916c6cb069e176740ca3b0dbc67b507c45e7119cb9eb26668c923dc138ec1f4a1e6e1d603bb2d343e

  • C:\Users\Admin\AppData\Local\Temp\Extends

    Filesize

    8KB

    MD5

    1d84284b8942f58060e1d05f0b1e188a

    SHA1

    b67d7f48760822e8af325f78d897e2d915de565c

    SHA256

    352e14e0acd212b3152ce18c1145028da38a7fbedf5cf736995e806f2388a113

    SHA512

    1de99eda612855e4303caa5fef13917081bcfa3bd6c7bbb363000dd0a8a19f98c15cdab9b8a8d5b86915b632589a831d4578b82ace71f0443792cc6e899d182a

  • C:\Users\Admin\AppData\Local\Temp\Feedback

    Filesize

    866KB

    MD5

    47f486f9a09c3c92d6c63df8a59e4964

    SHA1

    0b83d8336e74a094c9e4a85df296dcb3ef8f0a02

    SHA256

    49038116a1180b904492a7df13f7f37803f192e9f778c01e83d0378c5b842437

    SHA512

    f8c05cbf2a95d1fc86d78ff58abe4d2c1ff9d296815f44c9db89225f87043e34553a0d1062f9f2e89910957c13b2fe4766ad80769a1e746949ac16d85917dd58

  • C:\Users\Admin\AppData\Local\Temp\Javascript

    Filesize

    60KB

    MD5

    e74399d04f69a683d98046ab88f5bba0

    SHA1

    c88af22c8c29c3405ea385fa6c792e490a12aec8

    SHA256

    961d4241d2a91eea86a27a5c746f65bce321b2bdca8048ae775a713a7cbc3ed6

    SHA512

    23074aeb05050c89ba14d30c99b580bc929745eaca718f937c3d7666a8165efb55f55b05257002035bd2f17b6de8b51355d2f4025996f0a81dc2d8b3c91359ee

  • C:\Users\Admin\AppData\Local\Temp\Packs

    Filesize

    38KB

    MD5

    5cbc78e7462b03104122bfcea6c0570f

    SHA1

    4b9f078f630e2f5530f247ea3e194e7b3877056b

    SHA256

    75f7b16d57b7956bb74e3640c616f432b773951855297743c90b735284a74165

    SHA512

    e6d0a80386fc4eb77c073fa1d0c6f49b36fe216276b64dd90c24de1ec77703cd0db6f4a586063579255d79cd85ef5e1a39578d48c3ca4023dc17e6701da5aa93

  • C:\Users\Admin\AppData\Local\Temp\Presence

    Filesize

    60KB

    MD5

    ee2ef75583f3d5eabc9de0aeeb588752

    SHA1

    072fbac659a8878a5ed39b8710ced7256d0a8b31

    SHA256

    3fc3907a25dea94f2848f8431111f1270a033277212fadff68cb1541dc7abb22

    SHA512

    7fa97e919747ce1bdf94012089ef50e2fa3b3b167b072f6deccb966009c4a94d37c60e89b6e1592593d0bcb6196cb9d781a370e727815bce1246d642278e49d9

  • C:\Users\Admin\AppData\Local\Temp\Projected

    Filesize

    6KB

    MD5

    93e1c03496c73ce0227eebfe83b0bd3d

    SHA1

    e571d6fdee00475b54029a6af43ab1341abac5dc

    SHA256

    f36376d6c3ca12b169ec967ac62ffab30840073edb1d6f6128dfd294753a1444

    SHA512

    20a24d9bf4aaa49f9ffcf6774678aef655b924c93dc42d5520bc312dbb8023ef90747e12ab0436f8e61a754abfd840bbf854a061d90d395f8a422200649a5c4b

  • C:\Users\Admin\AppData\Local\Temp\Settlement

    Filesize

    88KB

    MD5

    7c56f2bf9a311376e68263ee9c5a8393

    SHA1

    797bd5804a7a3f9425e23f9caf70aa473a46adaf

    SHA256

    fdbafb85b95cd634ec53a63e29e0a2d34704ed22e356907961a5eb9e7d056e1a

    SHA512

    2b0fdb236c7ec2434ccc3d9036dd80a37e8d3bf433d241809e9f869f6a8731955787230da22a1ed200677ecdceb65b40cca57dfb2c3f74ff68d3640bbbb729b5

  • memory/2700-27-0x00000000034F0000-0x0000000003751000-memory.dmp

    Filesize

    2.4MB

  • memory/2700-28-0x00000000034F0000-0x0000000003751000-memory.dmp

    Filesize

    2.4MB

  • memory/2700-29-0x00000000034F0000-0x0000000003751000-memory.dmp

    Filesize

    2.4MB

  • memory/2700-30-0x00000000034F0000-0x0000000003751000-memory.dmp

    Filesize

    2.4MB

  • memory/2700-31-0x00000000034F0000-0x0000000003751000-memory.dmp

    Filesize

    2.4MB