Analysis
-
max time kernel
94s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
pic5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
pic5.exe
Resource
win10v2004-20241007-en
General
-
Target
pic5.exe
-
Size
1.5MB
-
MD5
0b66bb8eb0bc59bb965c0ee45355f69f
-
SHA1
26e26c34955b16eeed5c8173f2ac918e127494bb
-
SHA256
c43f2f29df4960f5a64d9b28d4746b40d5e0bdcb9dc2fbc9d75c4050f22be272
-
SHA512
aad9592605724a6973bde97c799afcfd91e2f5bb02611f6e9ea339f8fdbd89c1ea7bca3e8fa5811619e29fd5fa0d52cf6b2dca95800df583d8a9d59fc9d1531f
-
SSDEEP
24576:GRvHTiBHPLRify9A5dmdeH2j0RSzh/hCVZ5QP4z/24zKpCZFRAT7Sf:q8jRbm5dz/gBqWP4/24uEk
Malware Config
Extracted
stealc
LogsDiller1
http://109.107.157.132
-
url_path
/7a5d4e643b804e99.php
Signatures
-
Stealc family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
pic5.exedescription pid Process procid_target PID 2472 set thread context of 552 2472 pic5.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pic5.exeMSBuild.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pic5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pic5.exepid Process 2472 pic5.exe 2472 pic5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
pic5.exedescription pid Process Token: SeDebugPrivilege 2472 pic5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
pic5.exedescription pid Process procid_target PID 2472 wrote to memory of 2548 2472 pic5.exe 90 PID 2472 wrote to memory of 2548 2472 pic5.exe 90 PID 2472 wrote to memory of 2548 2472 pic5.exe 90 PID 2472 wrote to memory of 552 2472 pic5.exe 91 PID 2472 wrote to memory of 552 2472 pic5.exe 91 PID 2472 wrote to memory of 552 2472 pic5.exe 91 PID 2472 wrote to memory of 552 2472 pic5.exe 91 PID 2472 wrote to memory of 552 2472 pic5.exe 91 PID 2472 wrote to memory of 552 2472 pic5.exe 91 PID 2472 wrote to memory of 552 2472 pic5.exe 91 PID 2472 wrote to memory of 552 2472 pic5.exe 91 PID 2472 wrote to memory of 552 2472 pic5.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\pic5.exe"C:\Users\Admin\AppData\Local\Temp\pic5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:552
-