Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 07:58
Static task
static1
Behavioral task
behavioral1
Sample
99fad17313297da97105802d647b80b6.exe
Resource
win7-20240903-en
General
-
Target
99fad17313297da97105802d647b80b6.exe
-
Size
451KB
-
MD5
99fad17313297da97105802d647b80b6
-
SHA1
6c2dea3d27486863a220b9dfc7ee30d8dd65903b
-
SHA256
6edf3196e1691e0034185df3ac2eaad51a33248c305e35927fb5f6b5e13fa58e
-
SHA512
40de9a35ddf446b5b21a07c2dc4c4074bf9bd1d024c4a7c368f5f770a705c83d8e9f4f258ad6d4bf510617b5bb0f2a070e6a0fd100aa25e5d3aacc7431e34466
-
SSDEEP
6144:z2hLDaY1jCphfzS+2Yex/korSNb5xBHGJ0gzYAq:6hfaKUhfmxZIb5vGF
Malware Config
Extracted
stealc
default
http://92.255.57.89
-
url_path
/45c616e921a794b8.php
Signatures
-
Stealc family
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2568 14F9.tmp.exe -
Loads dropped DLL 4 IoCs
pid Process 2188 99fad17313297da97105802d647b80b6.exe 2188 99fad17313297da97105802d647b80b6.exe 2188 99fad17313297da97105802d647b80b6.exe 2188 99fad17313297da97105802d647b80b6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99fad17313297da97105802d647b80b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14F9.tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 99fad17313297da97105802d647b80b6.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2188 99fad17313297da97105802d647b80b6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2568 2188 99fad17313297da97105802d647b80b6.exe 31 PID 2188 wrote to memory of 2568 2188 99fad17313297da97105802d647b80b6.exe 31 PID 2188 wrote to memory of 2568 2188 99fad17313297da97105802d647b80b6.exe 31 PID 2188 wrote to memory of 2568 2188 99fad17313297da97105802d647b80b6.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\99fad17313297da97105802d647b80b6.exe"C:\Users\Admin\AppData\Local\Temp\99fad17313297da97105802d647b80b6.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\14F9.tmp.exe"C:\Users\Admin\AppData\Local\Temp\14F9.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD51a1d5627373ecd30414938e941f281b8
SHA121395fc347e167b889818461becca2e242f889af
SHA256fa20b849ebe7c53d59f3ed0fcfac8445ea08e7296af5ada0d3be2aace5d727e8
SHA51243fe3b2dc363c5620c5c2c1a01b70f46cfb2ad8fb925816ef18adc4dc68d172c88e45a4d3c98adc299badc9890a3ff7106526d31e8714278567923f54ba779b2