Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe
Resource
win10v2004-20241007-en
General
-
Target
fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe
-
Size
3.5MB
-
MD5
e26bf23badb8afff9e70539ffd6ca7e4
-
SHA1
f2c387446c03ee7da47e7166263d1d2f345ff1cf
-
SHA256
fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19
-
SHA512
fe2a5f19cafe16fa6463d1df73c92e2f2e6752860ba9ba19f7d387c0b59cc8752be2097e260a389a3568a3422253a1bab0d95679f8a6c92b98ba856ff34cf759
-
SSDEEP
98304:7vLM9RjOpo1zMsVE8wppVom+NmesFZ0pmY6Df9xqqEby:2RjOqO85nNmDFZ0knf9Qy
Malware Config
Extracted
stealc
LogsDiller
http://212.86.115.216
-
url_path
/26ba0768f8501b95.php
Signatures
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1520 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3732 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1520 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe 1520 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe 1520 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe 1520 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2256 1520 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe 83 PID 1520 wrote to memory of 2256 1520 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe 83 PID 1520 wrote to memory of 2256 1520 fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe 83 PID 2256 wrote to memory of 3732 2256 cmd.exe 85 PID 2256 wrote to memory of 3732 2256 cmd.exe 85 PID 2256 wrote to memory of 3732 2256 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe"C:\Users\Admin\AppData\Local\Temp\fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\fabbd30d44740ec2df378b4145113fc8ae919b0d25fd902d1c6af55e46638d19.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3732
-
-