Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 18:38
Behavioral task
behavioral1
Sample
fast_copy.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fast_copy.exe
Resource
win10v2004-20241007-en
General
-
Target
fast_copy.exe
-
Size
5.6MB
-
MD5
f659a0d8ebd02ee8ee6eb70cef397cd7
-
SHA1
78c4038cd147d6e14cb0255e7ff170d477e9eca4
-
SHA256
307abb12c62dd8421cedfe6a11475e742caaae82faf9cb14d9812772edefe8d7
-
SHA512
ae5275a56c782960d7d3efdd32d8458300b763114d040723b363f51dbd77ae6e371ef3d4081745feac202890284c77ddf8e796289a473eb43b998172b6eaddb9
-
SSDEEP
98304:AUd98EKniqMUs8RVe0jHs4+b4EmeICxgHxC6qz1loJoYFqQ5dn6uqhAoCVtxnz+C:F8sn+RVJM44YCxwxmzLOFfdrq+P/xnCC
Malware Config
Extracted
stealc
benjiworld29
http://45.159.208.21
-
url_path
/e24f48bbd86dab7e.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x0000000000561000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Hijackloader family
-
Stealc family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2488 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fast_copy.exedescription pid process target process PID 2172 set thread context of 2488 2172 fast_copy.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fast_copy.execmd.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fast_copy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
fast_copy.execmd.exepid process 2172 fast_copy.exe 2172 fast_copy.exe 2488 cmd.exe 2488 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
fast_copy.execmd.exepid process 2172 fast_copy.exe 2488 cmd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
fast_copy.execmd.exedescription pid process target process PID 2172 wrote to memory of 2488 2172 fast_copy.exe cmd.exe PID 2172 wrote to memory of 2488 2172 fast_copy.exe cmd.exe PID 2172 wrote to memory of 2488 2172 fast_copy.exe cmd.exe PID 2172 wrote to memory of 2488 2172 fast_copy.exe cmd.exe PID 2172 wrote to memory of 2488 2172 fast_copy.exe cmd.exe PID 2488 wrote to memory of 1720 2488 cmd.exe explorer.exe PID 2488 wrote to memory of 1720 2488 cmd.exe explorer.exe PID 2488 wrote to memory of 1720 2488 cmd.exe explorer.exe PID 2488 wrote to memory of 1720 2488 cmd.exe explorer.exe PID 2488 wrote to memory of 1720 2488 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fast_copy.exe"C:\Users\Admin\AppData\Local\Temp\fast_copy.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD52a6f2580cc9f0c8f14e7d4f0bb480cf1
SHA1f1380e60332e59717712ec14e96fa0ab52c009ba
SHA256e88404e18425779a209b0441b5f1311caa6696fce0c827ed7beb70983b5783fd
SHA5120b51858ff3bcb88146ea9ef5ecd002818827bc9360873d942c3d7ecd7c1be524891ac451637d081623b517eb790e50926cc46de67fd3b9597eeb4350a8cebcc9