Analysis
-
max time kernel
95s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
956d73b7f041.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
956d73b7f041.exe
Resource
win10v2004-20240802-en
General
-
Target
956d73b7f041.exe
-
Size
503KB
-
MD5
054fec89fe7a32577df6035ee7e06de8
-
SHA1
14158263da82fdead85bed962ff9001d3e931dfd
-
SHA256
da88bc40c7826a659ebd6da325bd04c9f52d4ceeef6916aafeef471c685a96b9
-
SHA512
3429c5093d63512734559e0bfb7dd7898b18a43d6556de14446aa2226369f9de740103136f4ff04435f73978bba0718ba918878a22ebb4e78c7a99e25a78d4cd
-
SSDEEP
12288:HJ0/aAU4itlr3B85rDPuuSELDdmwOtrGk626eZhdIiSEO:QagitcTu28trGsWxt
Malware Config
Extracted
stealc
default5_doz
http://62.204.41.159
-
url_path
/edd20096ecef326d.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1616 set thread context of 2228 1616 956d73b7f041.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 1800 1616 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 956d73b7f041.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2228 1616 956d73b7f041.exe 82 PID 1616 wrote to memory of 2228 1616 956d73b7f041.exe 82 PID 1616 wrote to memory of 2228 1616 956d73b7f041.exe 82 PID 1616 wrote to memory of 2228 1616 956d73b7f041.exe 82 PID 1616 wrote to memory of 2228 1616 956d73b7f041.exe 82 PID 1616 wrote to memory of 2228 1616 956d73b7f041.exe 82 PID 1616 wrote to memory of 2228 1616 956d73b7f041.exe 82 PID 1616 wrote to memory of 2228 1616 956d73b7f041.exe 82 PID 1616 wrote to memory of 2228 1616 956d73b7f041.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\956d73b7f041.exe"C:\Users\Admin\AppData\Local\Temp\956d73b7f041.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 2362⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1616 -ip 16161⤵PID:4092