Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/11/2024, 16:59

General

  • Target

    7fff867271d6f0f7c301e83dad5875e2194dbf2389ac33130b7711db7e6904bd.exe

  • Size

    9.3MB

  • MD5

    c7ca98803a76b62a6a379a0b684b162a

  • SHA1

    00de8f4666fe890f9fd3bf2d405cae32f3c2cc78

  • SHA256

    7fff867271d6f0f7c301e83dad5875e2194dbf2389ac33130b7711db7e6904bd

  • SHA512

    e9cf5fb9efd723fd404c10b3451ae6f22a8582041cd97292d09d43baaeb93f0d2f38f40cd9c1927221f8ad746b01490727c853b9a123fc4b34b6ce6ba557fb7b

  • SSDEEP

    24576:UYCZttSeaoP5LJSkOQv2pjXhFoEQPx4IERmTs6ICUZKVBkPHXNj24:UYCftdbPXSbm2CUZKVBkPHXNjf

Malware Config

Extracted

Family

stealc

Botnet

mainteam

C2

http://95.182.96.50

Attributes
  • url_path

    /2aced82320799c96.php

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fff867271d6f0f7c301e83dad5875e2194dbf2389ac33130b7711db7e6904bd.exe
    "C:\Users\Admin\AppData\Local\Temp\7fff867271d6f0f7c301e83dad5875e2194dbf2389ac33130b7711db7e6904bd.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 824
      2⤵
      • Program crash
      PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1048-0-0x00000000029D0000-0x0000000002C33000-memory.dmp

    Filesize

    2.4MB

  • memory/1048-1-0x00000000029D0000-0x0000000002C33000-memory.dmp

    Filesize

    2.4MB

  • memory/1048-3-0x00000000029D0000-0x0000000002C33000-memory.dmp

    Filesize

    2.4MB

  • memory/1048-4-0x00000000029D0000-0x0000000002C33000-memory.dmp

    Filesize

    2.4MB