Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
c3108cefdf629f631dbba54af7124abc.exe
Resource
win7-20240729-en
General
-
Target
c3108cefdf629f631dbba54af7124abc.exe
-
Size
420KB
-
MD5
c3108cefdf629f631dbba54af7124abc
-
SHA1
c9f7a200239da2e89ba8da6afae7fc87cf19537c
-
SHA256
91171af67f002002c7845dfc79d87ebdf86badd5c5f91727d00405d5638ab841
-
SHA512
5afcfff2041b4db85818097e453e6da7c1fb5e378688beeb50b06287b456fe82eee7020b38d37e03f9ee28383210e6a266f3ce86d07075bcf9467efd704ebb58
-
SSDEEP
6144:9tG76pKx44R/AdKguTHgQ5pe0stxs9D1Et7IqCARIICAblFC:54RuuTHgQ5+UZ1WCAmDM
Malware Config
Extracted
stealc
default
http://92.255.57.89
-
url_path
/45c616e921a794b8.php
Signatures
-
Stealc family
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2596 3FC0.tmp.exe -
Loads dropped DLL 5 IoCs
pid Process 2264 c3108cefdf629f631dbba54af7124abc.exe 2264 c3108cefdf629f631dbba54af7124abc.exe 2264 c3108cefdf629f631dbba54af7124abc.exe 2264 c3108cefdf629f631dbba54af7124abc.exe 2264 c3108cefdf629f631dbba54af7124abc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3108cefdf629f631dbba54af7124abc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3FC0.tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 c3108cefdf629f631dbba54af7124abc.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2264 c3108cefdf629f631dbba54af7124abc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2596 2264 c3108cefdf629f631dbba54af7124abc.exe 31 PID 2264 wrote to memory of 2596 2264 c3108cefdf629f631dbba54af7124abc.exe 31 PID 2264 wrote to memory of 2596 2264 c3108cefdf629f631dbba54af7124abc.exe 31 PID 2264 wrote to memory of 2596 2264 c3108cefdf629f631dbba54af7124abc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3108cefdf629f631dbba54af7124abc.exe"C:\Users\Admin\AppData\Local\Temp\c3108cefdf629f631dbba54af7124abc.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\3FC0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\3FC0.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD53e5fc816d18b06cefcb86a31ae9fe52e
SHA1d8f337ca370a09992ad27220f144a6f20c372251
SHA2561891f566c018182f1b5826b5fe2a05d6927aff15638d28c7cbe77ab11a366e12
SHA512e14098a1574cea3610f5256d6f97c53f2d98b660ac6efdc16e207e4241bedc95ed209f9d2174142c52657f8fe2ce29797684a54fe2598fcca6706794d76b092a