Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 16:58
Behavioral task
behavioral1
Sample
Stub.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Stub.exe
-
Size
50KB
-
MD5
bd6a376c90eadf8195a9fbb675f20f0f
-
SHA1
b320e1cea5643e6d6fc35041964dec0b3ada79c9
-
SHA256
d560e0f020e5ffa88111a40e79c6e9e1f95e308b1a0b8edc5eb4d4bdc655f828
-
SHA512
f00395b176efbf4de17820f84bd29b157b2074a9822753fe4f5ab69ce46dcac20116d83089f19277bf98b7db900e62422f07f4a26975fbd061026114a7dd7b47
-
SSDEEP
768:nyj6J8AtszpNXd4UDfeSTc0DPHBFUIzDBoff8BNB3aeb1Qd3kAK64DVFLf+:nEK8AtIHFSSTTDBfFhCebudUAXaFLf+
Malware Config
Signatures
-
Asyncrat family
-
Program crash 1 IoCs
pid pid_target Process procid_target 660 4408 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Stub.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4408 Stub.exe 4408 Stub.exe 4408 Stub.exe 4408 Stub.exe 4408 Stub.exe 4408 Stub.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4408 Stub.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stub.exe"C:\Users\Admin\AppData\Local\Temp\Stub.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 8962⤵
- Program crash
PID:660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4408 -ip 44081⤵PID:4904