Analysis

  • max time kernel
    134s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2024, 01:13

General

  • Target

    1528-157-0x0000000000A30000-0x00000000010E2000-memory.exe

  • Size

    6.7MB

  • MD5

    eb2c709a9345d924b7bc1f22e17d4953

  • SHA1

    3a9bff7ff958c1ab8a04c96bb258c121ae9f371d

  • SHA256

    540bd29a0195228e21d6a22e8e79b0d451d26454a23b6b1fc2f713c730b69997

  • SHA512

    dda7249ca05d396783d0af0e79aab19ee1a234ca88222008705e035cb7b29b2983a675bb69adc6a6a2408907addab19893f5e1e3f13928f682f62461e9ccdbec

  • SSDEEP

    98304:9ZGazUZZ2BFnJFEl6ofKckAE7sUIr90z:ueVJF+pXsyZm

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1528-157-0x0000000000A30000-0x00000000010E2000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1528-157-0x0000000000A30000-0x00000000010E2000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3648
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 216
      2⤵
      • Program crash
      PID:4904
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3648 -ip 3648
    1⤵
      PID:2392

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3648-0-0x0000000000F40000-0x00000000015F2000-memory.dmp

      Filesize

      6.7MB