Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
c3108cefdf629f631dbba54af7124abc.exe
Resource
win7-20240729-en
General
-
Target
c3108cefdf629f631dbba54af7124abc.exe
-
Size
420KB
-
MD5
c3108cefdf629f631dbba54af7124abc
-
SHA1
c9f7a200239da2e89ba8da6afae7fc87cf19537c
-
SHA256
91171af67f002002c7845dfc79d87ebdf86badd5c5f91727d00405d5638ab841
-
SHA512
5afcfff2041b4db85818097e453e6da7c1fb5e378688beeb50b06287b456fe82eee7020b38d37e03f9ee28383210e6a266f3ce86d07075bcf9467efd704ebb58
-
SSDEEP
6144:9tG76pKx44R/AdKguTHgQ5pe0stxs9D1Et7IqCARIICAblFC:54RuuTHgQ5+UZ1WCAmDM
Malware Config
Extracted
stealc
default
http://92.255.57.89
-
url_path
/45c616e921a794b8.php
Signatures
-
Stealc family
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation c3108cefdf629f631dbba54af7124abc.exe -
Executes dropped EXE 1 IoCs
pid Process 3888 C311.tmp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2244 3888 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3108cefdf629f631dbba54af7124abc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C311.tmp.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C311.tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C311.tmp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3888 C311.tmp.exe 3888 C311.tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1788 c3108cefdf629f631dbba54af7124abc.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1788 c3108cefdf629f631dbba54af7124abc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1788 wrote to memory of 3888 1788 c3108cefdf629f631dbba54af7124abc.exe 87 PID 1788 wrote to memory of 3888 1788 c3108cefdf629f631dbba54af7124abc.exe 87 PID 1788 wrote to memory of 3888 1788 c3108cefdf629f631dbba54af7124abc.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3108cefdf629f631dbba54af7124abc.exe"C:\Users\Admin\AppData\Local\Temp\c3108cefdf629f631dbba54af7124abc.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\C311.tmp.exe"C:\Users\Admin\AppData\Local\Temp\C311.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 10403⤵
- Program crash
PID:2244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3888 -ip 38881⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD53e5fc816d18b06cefcb86a31ae9fe52e
SHA1d8f337ca370a09992ad27220f144a6f20c372251
SHA2561891f566c018182f1b5826b5fe2a05d6927aff15638d28c7cbe77ab11a366e12
SHA512e14098a1574cea3610f5256d6f97c53f2d98b660ac6efdc16e207e4241bedc95ed209f9d2174142c52657f8fe2ce29797684a54fe2598fcca6706794d76b092a