Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 19:09
Behavioral task
behavioral1
Sample
0x000b00000001e4ef-846.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0x000b00000001e4ef-846.exe
Resource
win10v2004-20241007-en
General
-
Target
0x000b00000001e4ef-846.exe
-
Size
5.6MB
-
MD5
f659a0d8ebd02ee8ee6eb70cef397cd7
-
SHA1
78c4038cd147d6e14cb0255e7ff170d477e9eca4
-
SHA256
307abb12c62dd8421cedfe6a11475e742caaae82faf9cb14d9812772edefe8d7
-
SHA512
ae5275a56c782960d7d3efdd32d8458300b763114d040723b363f51dbd77ae6e371ef3d4081745feac202890284c77ddf8e796289a473eb43b998172b6eaddb9
-
SSDEEP
98304:AUd98EKniqMUs8RVe0jHs4+b4EmeICxgHxC6qz1loJoYFqQ5dn6uqhAoCVtxnz+C:F8sn+RVJM44YCxwxmzLOFfdrq+P/xnCC
Malware Config
Extracted
stealc
benjiworld29
http://45.159.208.21
-
url_path
/e24f48bbd86dab7e.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2892-0-0x0000000000400000-0x0000000000561000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Hijackloader family
-
Stealc family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2792 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0x000b00000001e4ef-846.exedescription pid process target process PID 2892 set thread context of 2792 2892 0x000b00000001e4ef-846.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeexplorer.exe0x000b00000001e4ef-846.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0x000b00000001e4ef-846.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
0x000b00000001e4ef-846.execmd.exepid process 2892 0x000b00000001e4ef-846.exe 2892 0x000b00000001e4ef-846.exe 2792 cmd.exe 2792 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
0x000b00000001e4ef-846.execmd.exepid process 2892 0x000b00000001e4ef-846.exe 2792 cmd.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
0x000b00000001e4ef-846.execmd.exedescription pid process target process PID 2892 wrote to memory of 2792 2892 0x000b00000001e4ef-846.exe cmd.exe PID 2892 wrote to memory of 2792 2892 0x000b00000001e4ef-846.exe cmd.exe PID 2892 wrote to memory of 2792 2892 0x000b00000001e4ef-846.exe cmd.exe PID 2892 wrote to memory of 2792 2892 0x000b00000001e4ef-846.exe cmd.exe PID 2892 wrote to memory of 2792 2892 0x000b00000001e4ef-846.exe cmd.exe PID 2792 wrote to memory of 436 2792 cmd.exe explorer.exe PID 2792 wrote to memory of 436 2792 cmd.exe explorer.exe PID 2792 wrote to memory of 436 2792 cmd.exe explorer.exe PID 2792 wrote to memory of 436 2792 cmd.exe explorer.exe PID 2792 wrote to memory of 436 2792 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000b00000001e4ef-846.exe"C:\Users\Admin\AppData\Local\Temp\0x000b00000001e4ef-846.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:436
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5c75ae98538d18a00c43e477062f68979
SHA1b3b208827b91e10e47c9fd911f4801d1ce2cdf3d
SHA256ca09d09fa9350db8504636004e1e2c931f28e4d26169462a837f1602e701ba4d
SHA5128b8cd8573585727cac06c06ac2a7de10f6d8a37d20e6af27fef65e434e81ceb702bedf333eebf0eefba76612e2015faaa99314cf926ad5bd5825062b994d1de8