Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 19:04

General

  • Target

    2832-37-0x0000000000D30000-0x00000000013CB000-memory.exe

  • Size

    6.6MB

  • MD5

    26edbb532eb3f668eb11477a6e629019

  • SHA1

    15f2774d2745f3ae8b9215abec25c5b3df3eb007

  • SHA256

    63a43c0443f4841e53d92687423a19f88ccf2a8933a523579743977b39ac216e

  • SHA512

    822c78af55c4c83a98d07ec863b66c1814eabb64f7b5f738c336c6279067412b34b1d1be19ab12f6dc3a9d8c23ddac94dd13e8c9e93c9e0a699fd871463aac38

  • SSDEEP

    98304:uptCFxC05Regn+g8UQG4uEdF35y1UKKz4fYbBFM:3aqeRg8UQTD3WUX0mo

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2832-37-0x0000000000D30000-0x00000000013CB000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2832-37-0x0000000000D30000-0x00000000013CB000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:832
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 192
      2⤵
      • Program crash
      PID:4108
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 832 -ip 832
    1⤵
      PID:2716

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/832-0-0x0000000000030000-0x00000000006CB000-memory.dmp

      Filesize

      6.6MB