Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe
Resource
win7-20240903-en
General
-
Target
1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe
-
Size
473KB
-
MD5
6e9a0ab2595f7c2c7055bda14628ffb2
-
SHA1
2ca02b85024075424528d8c5dd1ecc4bb6631de5
-
SHA256
1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1
-
SHA512
c6f8b3d8875460e29357bb1f3f05854ed27084fa5b072a279cd21b27cc8466818979d566250e1f2377f4b519d34ee426a5d8c2f79037816c06e5fdd1d7cd3120
-
SSDEEP
12288:LiO/Vwf1v8jvluf5SW0youRteJ1veFBlBGKXKAgKxlFsP:LT810lU5rBgmBlBKaxS
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2256 set thread context of 2872 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 31 -
Program crash 2 IoCs
pid pid_target Process procid_target 2644 2256 WerFault.exe 28 2648 2872 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2432 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 29 PID 2256 wrote to memory of 2432 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 29 PID 2256 wrote to memory of 2432 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 29 PID 2256 wrote to memory of 2432 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 29 PID 2256 wrote to memory of 2480 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 30 PID 2256 wrote to memory of 2480 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 30 PID 2256 wrote to memory of 2480 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 30 PID 2256 wrote to memory of 2480 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 30 PID 2256 wrote to memory of 2872 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 31 PID 2256 wrote to memory of 2872 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 31 PID 2256 wrote to memory of 2872 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 31 PID 2256 wrote to memory of 2872 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 31 PID 2256 wrote to memory of 2872 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 31 PID 2256 wrote to memory of 2872 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 31 PID 2256 wrote to memory of 2872 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 31 PID 2256 wrote to memory of 2872 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 31 PID 2256 wrote to memory of 2872 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 31 PID 2256 wrote to memory of 2872 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 31 PID 2256 wrote to memory of 2644 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 33 PID 2256 wrote to memory of 2644 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 33 PID 2256 wrote to memory of 2644 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 33 PID 2256 wrote to memory of 2644 2256 1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe 33 PID 2872 wrote to memory of 2648 2872 MSBuild.exe 32 PID 2872 wrote to memory of 2648 2872 MSBuild.exe 32 PID 2872 wrote to memory of 2648 2872 MSBuild.exe 32 PID 2872 wrote to memory of 2648 2872 MSBuild.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe"C:\Users\Admin\AppData\Local\Temp\1346beeb2362476fd773d6e3cda944040ba3945a49e29b08b25f889cf5ee26a1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2480
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 443⤵
- Program crash
PID:2648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 722⤵
- Program crash
PID:2644
-