Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 19:09
Behavioral task
behavioral1
Sample
0x000b00000001e4ef-846.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0x000b00000001e4ef-846.exe
Resource
win10v2004-20241007-en
General
-
Target
0x000b00000001e4ef-846.exe
-
Size
5.6MB
-
MD5
f659a0d8ebd02ee8ee6eb70cef397cd7
-
SHA1
78c4038cd147d6e14cb0255e7ff170d477e9eca4
-
SHA256
307abb12c62dd8421cedfe6a11475e742caaae82faf9cb14d9812772edefe8d7
-
SHA512
ae5275a56c782960d7d3efdd32d8458300b763114d040723b363f51dbd77ae6e371ef3d4081745feac202890284c77ddf8e796289a473eb43b998172b6eaddb9
-
SSDEEP
98304:AUd98EKniqMUs8RVe0jHs4+b4EmeICxgHxC6qz1loJoYFqQ5dn6uqhAoCVtxnz+C:F8sn+RVJM44YCxwxmzLOFfdrq+P/xnCC
Malware Config
Extracted
stealc
benjiworld29
http://45.159.208.21
-
url_path
/e24f48bbd86dab7e.php
Signatures
-
Detects HijackLoader (aka IDAT Loader) 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4724-0-0x0000000000400000-0x0000000000561000-memory.dmp family_hijackloader -
HijackLoader
HijackLoader is a multistage loader first seen in 2023.
-
Hijackloader family
-
Stealc family
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2680 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0x000b00000001e4ef-846.exedescription pid process target process PID 4724 set thread context of 2680 4724 0x000b00000001e4ef-846.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0x000b00000001e4ef-846.execmd.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0x000b00000001e4ef-846.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
0x000b00000001e4ef-846.execmd.exepid process 4724 0x000b00000001e4ef-846.exe 4724 0x000b00000001e4ef-846.exe 2680 cmd.exe 2680 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
0x000b00000001e4ef-846.execmd.exepid process 4724 0x000b00000001e4ef-846.exe 2680 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0x000b00000001e4ef-846.execmd.exedescription pid process target process PID 4724 wrote to memory of 2680 4724 0x000b00000001e4ef-846.exe cmd.exe PID 4724 wrote to memory of 2680 4724 0x000b00000001e4ef-846.exe cmd.exe PID 4724 wrote to memory of 2680 4724 0x000b00000001e4ef-846.exe cmd.exe PID 4724 wrote to memory of 2680 4724 0x000b00000001e4ef-846.exe cmd.exe PID 2680 wrote to memory of 2504 2680 cmd.exe explorer.exe PID 2680 wrote to memory of 2504 2680 cmd.exe explorer.exe PID 2680 wrote to memory of 2504 2680 cmd.exe explorer.exe PID 2680 wrote to memory of 2504 2680 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x000b00000001e4ef-846.exe"C:\Users\Admin\AppData\Local\Temp\0x000b00000001e4ef-846.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55f8e22e91f4cf9aac34f28eff1359abd
SHA14087d0a4db781311c3f00c18ca8b5e25c29c3ec8
SHA256dab4a678286708cae1b65bd7971caefbd6349965021a39349f2cbf1b81fe74c6
SHA51236919cd18f8c4f4d9685bf4c9b42dc0c62c5163bf3017783072126d42b090c77c1b31fe26d3fc5c0d0b37887cbf958dcfa45864baad796f5b7b62a7919dca30c