Analysis

  • max time kernel
    133s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 20:55

General

  • Target

    3588-27-0x0000000000C60000-0x0000000001364000-memory.exe

  • Size

    7.0MB

  • MD5

    645adea58a8b558a5ef0504742c974fc

  • SHA1

    f9efc5eea1fabf1b073651afe146bc499b44c39d

  • SHA256

    f96e4bc8d32e9680fe214308ce2eef9554743b5cb28771e4453ef2bef5d1a7d8

  • SHA512

    4529b4019d6875189cee7ed70b5e694326276d387a0ec9d07ca36b7b0afeb1f78eb217213530fc9778173a5ed150a999b410d0862918c9815e6bce724853bb98

  • SSDEEP

    98304:h8GJtF4RIwybIWhUHpH8NpG4be9ZmSR3CXWr9Rl0wgnHq9DTNVN3:uGh6ybIFC0oS3bRl8nKvb

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3588-27-0x0000000000C60000-0x0000000001364000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\3588-27-0x0000000000C60000-0x0000000001364000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4828
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 216
      2⤵
      • Program crash
      PID:3364
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4828 -ip 4828
    1⤵
      PID:548

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4828-0-0x00000000008E0000-0x0000000000FE4000-memory.dmp

      Filesize

      7.0MB