Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2024, 18:44

General

  • Target

    2364-3-0x0000000000AD0000-0x000000000117D000-memory.exe

  • Size

    6.7MB

  • MD5

    701442c4982a15a695f486c5efeee633

  • SHA1

    62b6ef2814b6852aa37067626a56f2a13bf24784

  • SHA256

    edf2d2c46c0b21f12cf6e01ba7152ebad63aecd37bdb72bdbd3ffd038070b109

  • SHA512

    5541ac14f674f20c4929e7152d6b07d00eaeb837f4bf0d9c47009f29f38436d13ddc6ec87c67a8e9ddbc5dd53cbc33c3a34e7afc8bf48dc58a0501e7f4413d5c

  • SSDEEP

    98304:Dt6yLYW6Hbr08nR2iI9jdzAXbWnuYp5MVNb5o:YLy9jHuYv4

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2364-3-0x0000000000AD0000-0x000000000117D000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2364-3-0x0000000000AD0000-0x000000000117D000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4992
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 176
      2⤵
      • Program crash
      PID:4428
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4992 -ip 4992
    1⤵
      PID:4436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4992-0-0x0000000000CB0000-0x000000000135D000-memory.dmp

      Filesize

      6.7MB