Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 21:52
Behavioral task
behavioral1
Sample
2f8021e35e775898244a0be54c5eb37ca6b65ea7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2f8021e35e775898244a0be54c5eb37ca6b65ea7.exe
Resource
win10v2004-20241007-en
General
-
Target
2f8021e35e775898244a0be54c5eb37ca6b65ea7.exe
-
Size
396KB
-
MD5
4788afa2fd8b4d90e6fd1d18bbb88f48
-
SHA1
2f8021e35e775898244a0be54c5eb37ca6b65ea7
-
SHA256
d5b0f260bc71c5d65d075add4186c15ac68d676191ad4cf207f95a8c0bcfb6bf
-
SHA512
be06e5ceec0fbdb07025a6275a6af5a865a1d47d87dadafaf39230b6187caa0621f127297d1daed1298462ceb546a2012ee61c1a51f0f755d3be8e019faaba18
-
SSDEEP
6144:rbODqpwPEuxGH6OrwX3pwzZwEq7EtE6xBpgwSOm92BUz7BJwaPEqrPlTux0:ryPPDLOrwX3pwzZwGB7k2uvfwARI0
Malware Config
Extracted
sharpstealer
https://api.telegram.org/bot7813335994:AAF06QjFbKeU5g2fyVosbcjJo-OGDToKI_0/sendMessage?chat_id=1713921305
-
max_exfil_filesize
1.5e+06
-
proxy_port
168.235.103.57:3128
-
vime_world
false
Signatures
-
Sharp Stealer
Sharp Stealer is an infostealer first observed in 2024, based on Echelon and Umbral stealers.
-
Sharpstealer family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org 6 freegeoip.app 7 freegeoip.app -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2888 2f8021e35e775898244a0be54c5eb37ca6b65ea7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2888 2f8021e35e775898244a0be54c5eb37ca6b65ea7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2476 2888 2f8021e35e775898244a0be54c5eb37ca6b65ea7.exe 30 PID 2888 wrote to memory of 2476 2888 2f8021e35e775898244a0be54c5eb37ca6b65ea7.exe 30 PID 2888 wrote to memory of 2476 2888 2f8021e35e775898244a0be54c5eb37ca6b65ea7.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f8021e35e775898244a0be54c5eb37ca6b65ea7.exe"C:\Users\Admin\AppData\Local\Temp\2f8021e35e775898244a0be54c5eb37ca6b65ea7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2888 -s 17882⤵PID:2476
-