Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 20:25

General

  • Target

    8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe

  • Size

    268KB

  • MD5

    8d8aa54b0c0a3f1f4afb0b75c04a4450

  • SHA1

    e2f282a67ce05ff1940a974051defac4649ab65c

  • SHA256

    8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4

  • SHA512

    1f067acc99ba56176404ed70ec894beb3f4a2abcdddf4783716ef5d14003dad5154059b7abec6d465abf9545994e09a9b7c24c39b96e6442196931f6e25ac6e6

  • SSDEEP

    6144:GvR9o/cALHzDLqiRTON/vY47++t1MC4R/utYa99S2UH8:GvR9ULH3LqiR+X7vdEW6a99E8

Malware Config

Extracted

Family

growtopia

C2

https://discord.com/api/webhooks/1174126211287502920/XDstkXt2u1d5Lf7d1i20yIzekmk9ugb8Uvw6DAbEeaE8aoHUVbEZLce-uNuES9iumefz

Attributes
  • payload_url

    https://cdn.discordapp.com/attachments/819331742212161576/877226130640343090/newlog.gif

    https://cdn.discordapp.com/attachments/819331742212161576/877227264864055327/clipboard.gif

    https://cdn.discordapp.com/attachments/819331742212161576/877216643896459294/clipboard.gif

    https://cdn.discordapp.com/attachments/819331742212161576/877223646391844904/savedat.gif

    https://cdn.discordapp.com/attachments/819331742212161576/877225829988438026/growtopia.gif

    https://cdn.discordapp.com/attachments/819331742212161576/877290738235351151/terraria.jpg

    https://cdn.discordapp.com/attachments/819331742212161576/877299612392751124/terraria.gif

Signatures

  • Growtopia

    Growtopa is an opensource modular stealer written in C#.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe
    "C:\Users\Admin\AppData\Local\Temp\8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4608
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 868
      2⤵
      • Program crash
      PID:2776
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4608 -ip 4608
    1⤵
      PID:1396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4608-0-0x0000000074F4E000-0x0000000074F4F000-memory.dmp

      Filesize

      4KB

    • memory/4608-1-0x0000000000BC0000-0x0000000000C08000-memory.dmp

      Filesize

      288KB