Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 16:41
Static task
static1
Behavioral task
behavioral1
Sample
0b9795bc5978c62899793b157271e979.exe
Resource
win7-20240729-en
General
-
Target
0b9795bc5978c62899793b157271e979.exe
-
Size
419KB
-
MD5
0b9795bc5978c62899793b157271e979
-
SHA1
d31405a2caf535d882fe873473df1badd7d5d028
-
SHA256
60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b
-
SHA512
ba7054eaa9ae5eb5a17fbb30a9ed0200cc11fee439d7795b6e78ea8fce3c5592ed6710eac1ecf5396ece510cf4972ae870e16de38af17580586cc39d0ad2387e
-
SSDEEP
12288:K3r16Nwm9j++TwWOQzHfFlQps+QMUoF9AFs7:K71wF++TLOYFl9MUo7AFs7
Malware Config
Extracted
stealc
default
http://92.255.57.89
-
url_path
/45c616e921a794b8.php
Signatures
-
Stealc family
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2584 3F72.tmp.exe -
Loads dropped DLL 5 IoCs
pid Process 2264 0b9795bc5978c62899793b157271e979.exe 2264 0b9795bc5978c62899793b157271e979.exe 2264 0b9795bc5978c62899793b157271e979.exe 2264 0b9795bc5978c62899793b157271e979.exe 2264 0b9795bc5978c62899793b157271e979.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b9795bc5978c62899793b157271e979.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3F72.tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 0b9795bc5978c62899793b157271e979.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2264 0b9795bc5978c62899793b157271e979.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2584 2264 0b9795bc5978c62899793b157271e979.exe 31 PID 2264 wrote to memory of 2584 2264 0b9795bc5978c62899793b157271e979.exe 31 PID 2264 wrote to memory of 2584 2264 0b9795bc5978c62899793b157271e979.exe 31 PID 2264 wrote to memory of 2584 2264 0b9795bc5978c62899793b157271e979.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b9795bc5978c62899793b157271e979.exe"C:\Users\Admin\AppData\Local\Temp\0b9795bc5978c62899793b157271e979.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\3F72.tmp.exe"C:\Users\Admin\AppData\Local\Temp\3F72.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5017e73f6839555aa663a62235a81b433
SHA1212a9b2425a3b7ea5861dfc8204847bf5872d0be
SHA25641c2c33823d372f8389b978fdaef60eb6d02aea21bf20b1aad7a11bde5f5dca8
SHA512c6ec29111019290c60202053674725b6cd978c599843d7e7eeef9482809ec9edbca18b5181b764a9dab2e3c9e5a76f34b8841e1b2fa6ebffa0c52a4588023641