Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
26ceb3d9dcc1821192b39eea6832d51d.exe
Resource
win7-20240708-en
General
-
Target
26ceb3d9dcc1821192b39eea6832d51d.exe
-
Size
420KB
-
MD5
26ceb3d9dcc1821192b39eea6832d51d
-
SHA1
d22dae62f3d122acaec58a03550d5d99a9b7cfb4
-
SHA256
fe7c9c900df7c51f53243053dcf41ee781d284206742952aea704735d8d4a198
-
SHA512
2dd773c7afa7cb46c1f94d195e9b542a5e8ec150b608d8dcde0aa60f7aff15ea0fced33fe647519cca91ada905dce14576a8b2b84bc0c9ecfc6f362a3cdccda8
-
SSDEEP
12288:+kmdgMiHbQuCIu+Sp+tXcyZpCxFzR7DB5:zmAHq+Sp+RbpCrF7V
Malware Config
Extracted
stealc
default
http://92.255.57.89
-
url_path
/45c616e921a794b8.php
Signatures
-
Stealc family
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 26ceb3d9dcc1821192b39eea6832d51d.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 B759.tmp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2792 2200 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26ceb3d9dcc1821192b39eea6832d51d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B759.tmp.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 B759.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString B759.tmp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2200 B759.tmp.exe 2200 B759.tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 26ceb3d9dcc1821192b39eea6832d51d.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2808 26ceb3d9dcc1821192b39eea6832d51d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2200 2808 26ceb3d9dcc1821192b39eea6832d51d.exe 90 PID 2808 wrote to memory of 2200 2808 26ceb3d9dcc1821192b39eea6832d51d.exe 90 PID 2808 wrote to memory of 2200 2808 26ceb3d9dcc1821192b39eea6832d51d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\26ceb3d9dcc1821192b39eea6832d51d.exe"C:\Users\Admin\AppData\Local\Temp\26ceb3d9dcc1821192b39eea6832d51d.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\B759.tmp.exe"C:\Users\Admin\AppData\Local\Temp\B759.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 10323⤵
- Program crash
PID:2792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2200 -ip 22001⤵PID:3788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD55de218396f8c0a36cee31b8ee4fd0bfe
SHA19a57c0ae8640caed5101372147b73c87dea4b2da
SHA25684b4eda5d456a2c49d117a0b99bc2ed03044eaa144eb5f6c28a248e673e406db
SHA51282f557e91f94a2ec8dee5b32e21b07bce01425ea72fa02ded984e5cdd98019c6028444f3cb10332661a1e8bd3a90edcd566b602cac03b94ccd1f276e4c59553f