Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe
Resource
win10v2004-20241007-en
General
-
Target
fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe
-
Size
3.5MB
-
MD5
e26bf23badb8afff9e70539ffd6ca7e4
-
SHA1
f2c387446c03ee7da47e7166263d1d2f345ff1cf
-
SHA256
fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19
-
SHA512
fe2a5f19cafe16fa6463d1df73c92e2f2e6752860ba9ba19f7d387c0b59cc8752be2097e260a389a3568a3422253a1bab0d95679f8a6c92b98ba856ff34cf759
-
SSDEEP
98304:7vLM9RjOpo1zMsVE8wppVom+NmesFZ0pmY6Df9xqqEby:2RjOqO85nNmDFZ0knf9Qy
Malware Config
Extracted
stealc
LogsDiller
http://212.86.115.216
-
url_path
/26ba0768f8501b95.php
Signatures
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 812 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2888 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 812 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe 812 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 812 wrote to memory of 2744 812 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe 31 PID 812 wrote to memory of 2744 812 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe 31 PID 812 wrote to memory of 2744 812 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe 31 PID 812 wrote to memory of 2744 812 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe 31 PID 2744 wrote to memory of 2888 2744 cmd.exe 33 PID 2744 wrote to memory of 2888 2744 cmd.exe 33 PID 2744 wrote to memory of 2888 2744 cmd.exe 33 PID 2744 wrote to memory of 2888 2744 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe"C:\Users\Admin\AppData\Local\Temp\fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2888
-
-