Overview
overview
10Static
static
10InfectedStealer.exe
windows7-x64
7InfectedStealer.exe
windows10-2004-x64
7Level 1 Deadcode.txt
windows7-x64
1Level 1 Deadcode.txt
windows10-2004-x64
1SimpleObfuscator.dll
windows7-x64
1SimpleObfuscator.dll
windows10-2004-x64
1Stub/Stub.exe
windows7-x64
10Stub/Stub.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 06:55
Behavioral task
behavioral1
Sample
InfectedStealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
InfectedStealer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Level 1 Deadcode.txt
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Level 1 Deadcode.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
SimpleObfuscator.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
SimpleObfuscator.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Stub/Stub.exe
Resource
win7-20240903-en
General
-
Target
InfectedStealer.exe
-
Size
4.3MB
-
MD5
3af4ffcfa2426836921b002f88c01b26
-
SHA1
9597bd7e519ef238c72416bd4d4945dc6fa1e05b
-
SHA256
d468d59ea330e48277fa1dd62eccb8d05b324eacb78b8bd1e54df0c9fb83d8f9
-
SHA512
6ebccd91ef6af4ff8b896a45a3c16aa28a8e8fb737a598e856441b6c9e59f8c6aa4af05d3abea279566b8a1196d1f05cac25661b78f3c50cde981790c8bf0a29
-
SSDEEP
98304:PkjozJ9/im8XVBKl6tmJVPS47x/EaR5zNNHtFWIT4bNJFY3OqttIFe:XzJpjS346tmJ1xsG53tFWjBHYdIw
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 8 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/3332-5-0x0000000006C70000-0x0000000006C90000-memory.dmp agile_net behavioral2/memory/3332-7-0x000000000A980000-0x000000000A9A0000-memory.dmp agile_net behavioral2/memory/3332-10-0x000000000A9F0000-0x000000000A9FE000-memory.dmp agile_net behavioral2/memory/3332-9-0x000000000AD60000-0x000000000ADCE000-memory.dmp agile_net behavioral2/memory/3332-11-0x000000000ADD0000-0x000000000AE2A000-memory.dmp agile_net behavioral2/memory/3332-13-0x000000000AE30000-0x000000000AE4E000-memory.dmp agile_net behavioral2/memory/3332-12-0x000000000AA20000-0x000000000AA30000-memory.dmp agile_net behavioral2/memory/3332-14-0x000000000BEC0000-0x000000000C00A000-memory.dmp agile_net -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 5 pastebin.com 7 pastebin.com 8 pastebin.com 16 pastebin.com 19 pastebin.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InfectedStealer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS InfectedStealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer InfectedStealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion InfectedStealer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe 3332 InfectedStealer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3332 InfectedStealer.exe