Analysis

  • max time kernel
    94s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 21:46

General

  • Target

    2864-38-0x00000000003C0000-0x0000000000A53000-memory.exe

  • Size

    6.6MB

  • MD5

    7308ef424c3109ec5174e158173d6e26

  • SHA1

    dcb371a3aee3fa5547472482003dbe496f444bec

  • SHA256

    d3b46933abd91b3f6ba53e0cae3a6a0694744d0497a9db6cac8ec8ebfe774107

  • SHA512

    235bfc5692eab90111d48b4519e78c39850ef19a02b2139c7967753a2de92b2cebd74c5d7eb73fda862fa5e9044b47c55e9197187422a2f137b7028505d1f0ba

  • SSDEEP

    98304:nogXpwkVBywHjPftSKl1Wf2z3nSxgWsQtxgVU5n+2o:nx1WOGW63F

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2864-38-0x00000000003C0000-0x0000000000A53000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2864-38-0x00000000003C0000-0x0000000000A53000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 216
      2⤵
      • Program crash
      PID:2436
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3380 -ip 3380
    1⤵
      PID:2616

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3380-0-0x0000000000CF0000-0x0000000001383000-memory.dmp

      Filesize

      6.6MB