Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
503KB
-
MD5
926dd9e88e2ac846eaf3c23ef8208cdf
-
SHA1
95e642c98048b718b948425e39a746d66d0dd4db
-
SHA256
ad277a48c7c67f5510e0d2b28284f631f9e51dd7da53ed9e4da8dec0078d9aa0
-
SHA512
ff5c31b9ffe58b88983ba2c2f8f2195c454fe69f05a9d5a40aa90227461fb3a1994c778b026a723715ab5d3664702f47df84336afd5b495cd258a1514f75eb30
-
SSDEEP
12288:sA4gyTSwAN2kL0PPJHBlOyLwFrpOu6VSlC8OIlr7v:sxgFN2kL03HlpLwFrpOu6qC83r7v
Malware Config
Extracted
stealc
LogsDiller1
http://109.107.157.132
-
url_path
/7a5d4e643b804e99.php
Signatures
-
Stealc family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2308 set thread context of 2704 2308 file.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2788 2704 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2704 2308 file.exe 32 PID 2308 wrote to memory of 2704 2308 file.exe 32 PID 2308 wrote to memory of 2704 2308 file.exe 32 PID 2308 wrote to memory of 2704 2308 file.exe 32 PID 2308 wrote to memory of 2704 2308 file.exe 32 PID 2308 wrote to memory of 2704 2308 file.exe 32 PID 2308 wrote to memory of 2704 2308 file.exe 32 PID 2308 wrote to memory of 2704 2308 file.exe 32 PID 2308 wrote to memory of 2704 2308 file.exe 32 PID 2308 wrote to memory of 2704 2308 file.exe 32 PID 2704 wrote to memory of 2788 2704 file.exe 33 PID 2704 wrote to memory of 2788 2704 file.exe 33 PID 2704 wrote to memory of 2788 2704 file.exe 33 PID 2704 wrote to memory of 2788 2704 file.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 443⤵
- Program crash
PID:2788
-
-