Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 14:11

General

  • Target

    1752-2547-0x00000000012B0000-0x0000000001940000-memory.exe

  • Size

    6.6MB

  • MD5

    8865865a21ae6f7330f303cdabf10351

  • SHA1

    1a3893c01593ee6e8be7ec454a13284a891b3220

  • SHA256

    87f3729a6dc16a37ce5e968790612592d8c0819952074dd90a835260510a7347

  • SHA512

    29556d44d9079d47d9f06bae1fa5653c34c14f93c89024fe718707eca9a26395e60a5d233e7a3e1377d2f3733279e76ec3b48162bd5e75ed5c5972d55b5f2cd2

  • SSDEEP

    98304:regfdT7yrLUnb/QIYnSxfquEsXKs3BU3o9kY4/kB:7nMpSMuj6Cm3oG

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1752-2547-0x00000000012B0000-0x0000000001940000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1752-2547-0x00000000012B0000-0x0000000001940000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2876
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 216
      2⤵
      • Program crash
      PID:4100
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2876 -ip 2876
    1⤵
      PID:4136

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2876-0-0x00000000010A0000-0x0000000001730000-memory.dmp

      Filesize

      6.6MB