Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 16:41
Static task
static1
Behavioral task
behavioral1
Sample
0b9795bc5978c62899793b157271e979.exe
Resource
win7-20240729-en
General
-
Target
0b9795bc5978c62899793b157271e979.exe
-
Size
419KB
-
MD5
0b9795bc5978c62899793b157271e979
-
SHA1
d31405a2caf535d882fe873473df1badd7d5d028
-
SHA256
60af68dc8e940dae29691baa206ab9638bcff227b814c6cc33420edc0b3ac80b
-
SHA512
ba7054eaa9ae5eb5a17fbb30a9ed0200cc11fee439d7795b6e78ea8fce3c5592ed6710eac1ecf5396ece510cf4972ae870e16de38af17580586cc39d0ad2387e
-
SSDEEP
12288:K3r16Nwm9j++TwWOQzHfFlQps+QMUoF9AFs7:K71wF++TLOYFl9MUo7AFs7
Malware Config
Extracted
stealc
default
http://92.255.57.89
-
url_path
/45c616e921a794b8.php
Signatures
-
Stealc family
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0b9795bc5978c62899793b157271e979.exe -
Executes dropped EXE 1 IoCs
pid Process 1612 CCB6.tmp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4876 1612 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b9795bc5978c62899793b157271e979.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CCB6.tmp.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString CCB6.tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CCB6.tmp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1612 CCB6.tmp.exe 1612 CCB6.tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3380 0b9795bc5978c62899793b157271e979.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3380 0b9795bc5978c62899793b157271e979.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3380 wrote to memory of 1612 3380 0b9795bc5978c62899793b157271e979.exe 87 PID 3380 wrote to memory of 1612 3380 0b9795bc5978c62899793b157271e979.exe 87 PID 3380 wrote to memory of 1612 3380 0b9795bc5978c62899793b157271e979.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b9795bc5978c62899793b157271e979.exe"C:\Users\Admin\AppData\Local\Temp\0b9795bc5978c62899793b157271e979.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\CCB6.tmp.exe"C:\Users\Admin\AppData\Local\Temp\CCB6.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 13043⤵
- Program crash
PID:4876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1612 -ip 16121⤵PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5017e73f6839555aa663a62235a81b433
SHA1212a9b2425a3b7ea5861dfc8204847bf5872d0be
SHA25641c2c33823d372f8389b978fdaef60eb6d02aea21bf20b1aad7a11bde5f5dca8
SHA512c6ec29111019290c60202053674725b6cd978c599843d7e7eeef9482809ec9edbca18b5181b764a9dab2e3c9e5a76f34b8841e1b2fa6ebffa0c52a4588023641