Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 06:38

General

  • Target

    228-49-0x0000000000060000-0x0000000000552000-memory.exe

  • Size

    4.9MB

  • MD5

    f6623a0ef198e1c93e1466e1ad5098bc

  • SHA1

    86886144cc18235450cad0614a17b97a7f927f48

  • SHA256

    01b39c015903e1c4d16499954a6bf70c8f1c14eac062e24688618d4dd7221362

  • SHA512

    569c0ae764a52a794d3ef37144ba21554d9c110fa5b673c155d6daf8af94e6d5820d8306aad6430f0c3619155e452cbf8c8659fcfe0b90fe4ebc489f9c86adc4

  • SSDEEP

    49152:XNUL3ekEYseAV4pWCrFvYiuV71glQM/N3G:6LOkj6VJCrFrm715A3

Malware Config

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\228-49-0x0000000000060000-0x0000000000552000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\228-49-0x0000000000060000-0x0000000000552000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1020
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 224
      2⤵
      • Program crash
      PID:4516
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1020 -ip 1020
    1⤵
      PID:1896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1020-0-0x00000000009E0000-0x0000000000ED2000-memory.dmp

      Filesize

      4.9MB