Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe
Resource
win7-20240708-en
General
-
Target
ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe
-
Size
1.7MB
-
MD5
c39eb549a7dc6f9f6eeababcaea602dc
-
SHA1
33c34ab34eb843e347694db102e68ae0b59d9c29
-
SHA256
ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99
-
SHA512
8702781d879c22ef45362e0e539015670c3365724b519881ee6a7e10b241540080c196ddd52003b8395c338dbf8448485703b076e43c17e8466e41f41dc40ee4
-
SSDEEP
49152:6EAbSm7HDq7+ygwH+xvpQ2PgJ2RwjWQOViK:6Ea7HDq6Ekv9PggRwjWQO3
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exepid Process 1540 ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exepid Process 1540 ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe 1540 ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe"C:\Users\Admin\AppData\Local\Temp\ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1540