Overview
overview
10Static
static
101cb080c3d6...ea.exe
windows7-x64
101cb080c3d6...ea.exe
windows10-2004-x64
102161f38eb7...70.exe
windows7-x64
102161f38eb7...70.exe
windows10-2004-x64
102705528029...00.exe
windows7-x64
102705528029...00.exe
windows10-2004-x64
1049299f91e7...9f.elf
ubuntu-24.04-amd64
46f881e1052...93.exe
windows7-x64
106f881e1052...93.exe
windows10-2004-x64
10a8a1a9e80f...ef.exe
windows7-x64
10a8a1a9e80f...ef.exe
windows10-2004-x64
10e52067c5c5...a6.exe
windows7-x64
10e52067c5c5...a6.exe
windows10-2004-x64
10Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 14:55
Behavioral task
behavioral1
Sample
1cb080c3d69281ff2af28a3b9f448ba493bba28b1c2fde989d5fe91eef4689ea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1cb080c3d69281ff2af28a3b9f448ba493bba28b1c2fde989d5fe91eef4689ea.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
2161f38eb7e940f7dadbf1cff93e3219846ad9dd1d181aceadddd9b1f549bf70.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
2161f38eb7e940f7dadbf1cff93e3219846ad9dd1d181aceadddd9b1f549bf70.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
49299f91e7332c216e492d160c690a529b1b644bfd5879eefaf2ae37e2ea3a9f.elf
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral8
Sample
6f881e1052c12c0f98f059f796602945b01a359c8d6154eb0e731dd6309a5f93.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
6f881e1052c12c0f98f059f796602945b01a359c8d6154eb0e731dd6309a5f93.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
a8a1a9e80fd7d0ce85227bafd2ec004d2cb52d7e37744cd37bd3641c946822ef.exe
Resource
win7-20240704-en
Behavioral task
behavioral11
Sample
a8a1a9e80fd7d0ce85227bafd2ec004d2cb52d7e37744cd37bd3641c946822ef.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
e52067c5c5842359f70b1196fd0ed1b9e119ae8eb11408f2a08f0487dc2d21a6.exe
Resource
win7-20240903-en
General
-
Target
27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe
-
Size
326KB
-
MD5
adcbb5fa5706fb287f01370eb99e0d10
-
SHA1
2bff6fd096b95b1591259d223f7a0ced2bb1c79f
-
SHA256
27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700
-
SHA512
c2c9addbbbad6c678069874428ab54060550e583e018af9052a8445ee32bfb72586592711b6ae25d392378e50fdfb2ff9a6741d4aa4a5b15cd0b16176db0b8f1
-
SSDEEP
6144:Ns/IeaQRgAaVIEs1gsHKyDbrXtkD+yEl9WsAwT92ORxEO:qweRd11d5frdhyEl9WiT93EO
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 292 set thread context of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2480 2696 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 292 wrote to memory of 2696 292 27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe 31 PID 2696 wrote to memory of 2480 2696 RegAsm.exe 32 PID 2696 wrote to memory of 2480 2696 RegAsm.exe 32 PID 2696 wrote to memory of 2480 2696 RegAsm.exe 32 PID 2696 wrote to memory of 2480 2696 RegAsm.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe"C:\Users\Admin\AppData\Local\Temp\27055280296d10b811b4d76456dbc5d29aac8b4fc33708fa47b36334e1d85700.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 2523⤵
- Program crash
PID:2480
-
-