Analysis
-
max time kernel
138s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe
Resource
win7-20240708-en
General
-
Target
3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe
-
Size
2.0MB
-
MD5
e9e08496a40c5a11165101ac24017cba
-
SHA1
71a1821737417c3b3cf665361203532893413e61
-
SHA256
3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969
-
SHA512
4e7170f6952f05b9f49e330f60454351b39fc4ed425f3ca5b3f957b1c8fd657e9b2e52c3ddae16893eaf69da6a56a1979e45b74797bcd1b46fd1c2e231ab7883
-
SSDEEP
49152:O/oAL2TPzCrmYAr9nwiihSG77c7lL3yMqk132U0rzm1Fktj:ELizCrmYA1wiihR7alTf32U0rSFk
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Signatures
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2724 3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2724 3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe 2724 3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe"C:\Users\Admin\AppData\Local\Temp\3a40829c55f4ec87b90ef71e017a7c9f2fbe12f81e0ac4dbac6157d2dfb1f969.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2724