Resubmissions

04-12-2024 03:29

241204-d2b5qszkgy 6

04-12-2024 03:28

241204-d1js7avnfr 4

03-12-2024 21:38

241203-1hgbnsvrds 4

11-11-2024 08:27

241111-kcemwsvrew 10

Analysis

  • max time kernel
    35s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 03:28

General

  • Target

    stinger64.exe

  • Size

    46.8MB

  • MD5

    8b2e581985d25d62f445e35272b0166c

  • SHA1

    b9da986997c504d41dbcb2ba092950fb85d8c423

  • SHA256

    c30ffcd56304c8c37f3a909b8763bf0bac7ee171cf5d9b72bc16a904d3273271

  • SHA512

    5951c6714f38444fc3f15a351ffda226f9310282bda15cdc732774e0ea4c217438427cd3beba4fa30cb6dbc741b62377d0806748be7d4a9dd084607d2d46d34c

  • SSDEEP

    786432:yKNN8m/oiShrwFxCU+C5bUWUxEb140g1uwANq03j6QGBMiM5zPJeX57+8DUFJyft:pNaco5JKxCVCtUWX11QuDqMGQ4sJ27+a

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 3 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\stinger64.exe
    "C:\Users\Admin\AppData\Local\Temp\stinger64.exe"
    1⤵
    • Drops file in Program Files directory
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://www.trellix.com/en-us/downloads/free-tools/stinger.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3048
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1d2a1ac3cf9aba9ccce6eeabd900691b

      SHA1

      32fd33cf53b1414e845aa7c094514568595f304c

      SHA256

      bf76515c82eaa6312dac47ff3ee4f778b97a50efe97bedf1075a693d7938e9e9

      SHA512

      eadd5d125da60adbb97092752f5589f8f6b3d4e183bafe9e4601d86c32c2f2a934b8e4a0275ff9cfba090bdbf388e06a5735d2058773dcc9ee365b62baca9124

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      65ba3dbb77602fb34af2a95d0e675c31

      SHA1

      b250ac751071a1cf9bb62e89bb240ab071b392c2

      SHA256

      a0f0e4795b7bc08c3782329dcd96ac4deac61c6afe7ed7b16e4b107ef944376b

      SHA512

      d708f62f40ec2cb7db992100a8a13b0476b1712bc9f10d70919b1944bc419e4d69cad87cad9f99c0b58770fbc756b242a9baaaaea242155ad446d18aafd7c328

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f45e902a55eefc62c6360283283db79a

      SHA1

      d28a05236364da0ba6f61fe5c271944c10f87c9a

      SHA256

      38fcb9949bbeab5e4511f74352ab4a70d010f5b2808562f92e4a7d9b6f3b5592

      SHA512

      6ca1209067ca75dab07903683de4dd917ea308a103cacf57611c6a4becc0815bae4457c86c105ef50adceb7bf54a07e72486a1ec832d68f4500bc580fa7762a3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b3c52105a07b7685a89fc0cf2de04bca

      SHA1

      9f585348630a10b87a2b342b1ec39cd67052cb95

      SHA256

      095a0a12033ced3817ca2b760e9ae70e963c74ee1bed8ab3fbb3e60d7fb5eccc

      SHA512

      61751f9f0215c2e77059a8770c7e39d8003da3158025ac3ee3504036bb3f8954032a63676c4f1f6a657c8609a73ea48b0d89695f5fbc584a37728133135c5b1a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9fd4ce39356300e0a18e2a909f615819

      SHA1

      179b41dde4544c5240b52a6f6a53f7ea94220dc1

      SHA256

      d0091e65cd1cf728e0fcece2590e8bf5a661bf6ba0338075c6d2a6d8fb3eabb0

      SHA512

      25a3a2d585db65757d77c1014e4aea1400a245d96bab30ff6f955648e86c971571805e3b24e814c4286f447b1a004170351765f7ce18d32d26c4b75205325b5f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b05863776688321b4de08cc6045f7857

      SHA1

      d0843b46135670e570be40548403b098e065a413

      SHA256

      bc3f443fa944fd66d9c24b8f1e9a5f31e26abcbc7941a7812f41d2e65aaa5fe2

      SHA512

      6764675e65b2f18e5751392e14b38a07605b81e5a67fef7b0a4d604f7631cb91eef0de38d575148200e8cd567ff5c91c9e6f29ae19b1accd2ce34ae60316cbe8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      331c3623582febd8634ded91fec89785

      SHA1

      6caae1a5590f4ee9713f978f062ff145a1b78125

      SHA256

      c220568d2306d06b21337702de13fa5c84a09acda6a2ecf50d0c2fe62fbd41bb

      SHA512

      c27638915739032dc1f215d0894dc8d63b455226059f4fb87df088cea6d6f7601ea16fa5d2534ddb3420d3f9f5a702904456cc57c9cbe37052d88274062bcd16

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6aadd171e5376d6a0d1e211cb89f0eb7

      SHA1

      5c8208d88665c9ee56650c507abbdf4450e31832

      SHA256

      7880de9ee0474f02ba3429e3e8a8b67dec58b8b80981b33cc884af136194647d

      SHA512

      0e323f9184ebd78f7a886e6a194b61243a9678e8e2db069165f961f6cbcdce8aaea72d5b64d587e5576ed4ba84a807377edebb3abc17ff6dc26ba50390a61070

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d00b1242d408c5e15c9584bff66611dd

      SHA1

      1d157f17043cedebea6b81004ae1b4adb41cd87d

      SHA256

      6bdc20bdec9a9aaad45d0e28c5e2c45aac12a4aad6fdc5f95c794e3e3cc587ea

      SHA512

      dfb98a2584e520c15ec9b6626c2ebbf7d24121389f949ecc3ce0ce37fee58ea69ac58e35b655f495b9a26d4830c6755db16bf95b4c128a635f92a601c7e76c6e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      49c8cd45e1ff3f5446835da8a47582e2

      SHA1

      08691623e6a82a2a7d69cabd4b431e485758d807

      SHA256

      287e25ac84f840768c89284fa431602c4e0be35955c7779bdd6e9aaf67193069

      SHA512

      27dd7d4136f01a49987aef7f2eaeb55964e61b30a834ca3da00ca2ce20193d268cb93b6e78a949e1299881d9f0978fc237c95a6f40e5acbf63afa62295c593c9

    • C:\Users\Admin\AppData\Local\Temp\Cab762.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar85F.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Program Files\stinger\lockdown.dll

      Filesize

      65KB

      MD5

      9b4d3bef728c6fc641fe1c3adc27bfdc

      SHA1

      989d36dc90aa7f0184b2a067e44178d84672007e

      SHA256

      83b5408728d345401b3c5be28d1ac3e56da830de5ff54a9ab643a889b418d1df

      SHA512

      5b1662cd48bef4b57630e516e4a157f806cdccd968bec0ea5a5b6eab19454c5bebb491498c0f0a0031a7cd3a9759325fd17d7e29aace24721fe96b2c8a22f541

    • memory/2380-57-0x0000000140000000-0x0000000141000000-memory.dmp

      Filesize

      16.0MB

    • memory/2380-68-0x0000000140000000-0x0000000141000000-memory.dmp

      Filesize

      16.0MB

    • memory/2380-1-0x0000000146443000-0x0000000146444000-memory.dmp

      Filesize

      4KB

    • memory/2380-0-0x0000000140000000-0x0000000141000000-memory.dmp

      Filesize

      16.0MB