Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 18:38
Behavioral task
behavioral1
Sample
fast_copy.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fast_copy.exe
Resource
win10v2004-20241007-en
General
-
Target
fast_copy.exe
-
Size
5.6MB
-
MD5
f659a0d8ebd02ee8ee6eb70cef397cd7
-
SHA1
78c4038cd147d6e14cb0255e7ff170d477e9eca4
-
SHA256
307abb12c62dd8421cedfe6a11475e742caaae82faf9cb14d9812772edefe8d7
-
SHA512
ae5275a56c782960d7d3efdd32d8458300b763114d040723b363f51dbd77ae6e371ef3d4081745feac202890284c77ddf8e796289a473eb43b998172b6eaddb9
-
SSDEEP
98304:AUd98EKniqMUs8RVe0jHs4+b4EmeICxgHxC6qz1loJoYFqQ5dn6uqhAoCVtxnz+C:F8sn+RVJM44YCxwxmzLOFfdrq+P/xnCC
Malware Config
Extracted
stealc
benjiworld29
http://45.159.208.21
-
url_path
/e24f48bbd86dab7e.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
Processes:
resource yara_rule behavioral2/memory/760-0-0x0000000000400000-0x0000000000561000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Hijackloader family
-
Stealc family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 5000 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fast_copy.exedescription pid process target process PID 760 set thread context of 5000 760 fast_copy.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeexplorer.exefast_copy.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fast_copy.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
fast_copy.execmd.exepid process 760 fast_copy.exe 760 fast_copy.exe 5000 cmd.exe 5000 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
fast_copy.execmd.exepid process 760 fast_copy.exe 5000 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fast_copy.execmd.exedescription pid process target process PID 760 wrote to memory of 5000 760 fast_copy.exe cmd.exe PID 760 wrote to memory of 5000 760 fast_copy.exe cmd.exe PID 760 wrote to memory of 5000 760 fast_copy.exe cmd.exe PID 760 wrote to memory of 5000 760 fast_copy.exe cmd.exe PID 5000 wrote to memory of 1576 5000 cmd.exe explorer.exe PID 5000 wrote to memory of 1576 5000 cmd.exe explorer.exe PID 5000 wrote to memory of 1576 5000 cmd.exe explorer.exe PID 5000 wrote to memory of 1576 5000 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fast_copy.exe"C:\Users\Admin\AppData\Local\Temp\fast_copy.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:1576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD51d00a7630de9187b979ed8725b879c0f
SHA1867937f34290cd6f6f8140015ee9f5b5ee0394bb
SHA2566f945db60d46d427cdce1ae673edecf64bcdd1897dcefd087944546cec5cd240
SHA51221b6c6d6c65e263b46999b24b4c3226084c84611512f95b43ba52d0b5937887c3558381ed0e087f92a71f91478933d08d59bda306253312fb18a171a2445d181