Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-12-2024 06:38

General

  • Target

    228-49-0x0000000000060000-0x0000000000552000-memory.exe

  • Size

    4.9MB

  • MD5

    f6623a0ef198e1c93e1466e1ad5098bc

  • SHA1

    86886144cc18235450cad0614a17b97a7f927f48

  • SHA256

    01b39c015903e1c4d16499954a6bf70c8f1c14eac062e24688618d4dd7221362

  • SHA512

    569c0ae764a52a794d3ef37144ba21554d9c110fa5b673c155d6daf8af94e6d5820d8306aad6430f0c3619155e452cbf8c8659fcfe0b90fe4ebc489f9c86adc4

  • SSDEEP

    49152:XNUL3ekEYseAV4pWCrFvYiuV71glQM/N3G:6LOkj6VJCrFrm715A3

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\228-49-0x0000000000060000-0x0000000000552000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\228-49-0x0000000000060000-0x0000000000552000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 36
      2⤵
      • Program crash
      PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2480-0-0x0000000000E70000-0x0000000001362000-memory.dmp

    Filesize

    4.9MB