Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
26ceb3d9dcc1821192b39eea6832d51d.exe
Resource
win7-20240708-en
General
-
Target
26ceb3d9dcc1821192b39eea6832d51d.exe
-
Size
420KB
-
MD5
26ceb3d9dcc1821192b39eea6832d51d
-
SHA1
d22dae62f3d122acaec58a03550d5d99a9b7cfb4
-
SHA256
fe7c9c900df7c51f53243053dcf41ee781d284206742952aea704735d8d4a198
-
SHA512
2dd773c7afa7cb46c1f94d195e9b542a5e8ec150b608d8dcde0aa60f7aff15ea0fced33fe647519cca91ada905dce14576a8b2b84bc0c9ecfc6f362a3cdccda8
-
SSDEEP
12288:+kmdgMiHbQuCIu+Sp+tXcyZpCxFzR7DB5:zmAHq+Sp+RbpCrF7V
Malware Config
Extracted
stealc
default
http://92.255.57.89
-
url_path
/45c616e921a794b8.php
Signatures
-
Stealc family
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2828 BD29.tmp.exe -
Loads dropped DLL 5 IoCs
pid Process 2184 26ceb3d9dcc1821192b39eea6832d51d.exe 2184 26ceb3d9dcc1821192b39eea6832d51d.exe 2184 26ceb3d9dcc1821192b39eea6832d51d.exe 2184 26ceb3d9dcc1821192b39eea6832d51d.exe 2184 26ceb3d9dcc1821192b39eea6832d51d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26ceb3d9dcc1821192b39eea6832d51d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BD29.tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 26ceb3d9dcc1821192b39eea6832d51d.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2184 26ceb3d9dcc1821192b39eea6832d51d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2828 2184 26ceb3d9dcc1821192b39eea6832d51d.exe 31 PID 2184 wrote to memory of 2828 2184 26ceb3d9dcc1821192b39eea6832d51d.exe 31 PID 2184 wrote to memory of 2828 2184 26ceb3d9dcc1821192b39eea6832d51d.exe 31 PID 2184 wrote to memory of 2828 2184 26ceb3d9dcc1821192b39eea6832d51d.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ceb3d9dcc1821192b39eea6832d51d.exe"C:\Users\Admin\AppData\Local\Temp\26ceb3d9dcc1821192b39eea6832d51d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\BD29.tmp.exe"C:\Users\Admin\AppData\Local\Temp\BD29.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD55de218396f8c0a36cee31b8ee4fd0bfe
SHA19a57c0ae8640caed5101372147b73c87dea4b2da
SHA25684b4eda5d456a2c49d117a0b99bc2ed03044eaa144eb5f6c28a248e673e406db
SHA51282f557e91f94a2ec8dee5b32e21b07bce01425ea72fa02ded984e5cdd98019c6028444f3cb10332661a1e8bd3a90edcd566b602cac03b94ccd1f276e4c59553f