Analysis
-
max time kernel
93s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 22:56
Static task
static1
Behavioral task
behavioral1
Sample
46DD34531761BBC552766131C1AC05CA.exe
Resource
win7-20241010-en
General
-
Target
46DD34531761BBC552766131C1AC05CA.exe
-
Size
4.2MB
-
MD5
46dd34531761bbc552766131c1ac05ca
-
SHA1
77de42cebb838e1c33baf9e05dffcc72b193ec8e
-
SHA256
bf142408e335b4fe9f03495b4eaf5629b30f8d9c7433c44b7532d42c67b4ad3f
-
SHA512
73f55f275b3d5220ccecb14fb2466a816ad14abfc863764b81be425b366f0681f693339fd15613761a997be1e6d78e2d72cea3282bb50dca54472ae5aac68f17
-
SSDEEP
49152:ImwTL1n769zo6wqdvplsq9oLc9sf/sygrCqEVjOCszxGsbcKPkQxnK:gLJ96BOc9B4KcK8cn
Malware Config
Extracted
stealc
meetvoov
http://185.216.71.4
-
url_path
/feed7c30357659ed.php
Signatures
-
Stealc family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4008 set thread context of 4984 4008 46DD34531761BBC552766131C1AC05CA.exe 96 -
Program crash 2 IoCs
pid pid_target Process procid_target 4380 4984 WerFault.exe 96 4000 4984 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46DD34531761BBC552766131C1AC05CA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4984 BitLockerToGo.exe 4984 BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4008 wrote to memory of 4984 4008 46DD34531761BBC552766131C1AC05CA.exe 96 PID 4008 wrote to memory of 4984 4008 46DD34531761BBC552766131C1AC05CA.exe 96 PID 4008 wrote to memory of 4984 4008 46DD34531761BBC552766131C1AC05CA.exe 96 PID 4008 wrote to memory of 4984 4008 46DD34531761BBC552766131C1AC05CA.exe 96 PID 4008 wrote to memory of 4984 4008 46DD34531761BBC552766131C1AC05CA.exe 96 PID 4008 wrote to memory of 4984 4008 46DD34531761BBC552766131C1AC05CA.exe 96 PID 4008 wrote to memory of 4984 4008 46DD34531761BBC552766131C1AC05CA.exe 96 PID 4008 wrote to memory of 4984 4008 46DD34531761BBC552766131C1AC05CA.exe 96 PID 4008 wrote to memory of 4984 4008 46DD34531761BBC552766131C1AC05CA.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\46DD34531761BBC552766131C1AC05CA.exe"C:\Users\Admin\AppData\Local\Temp\46DD34531761BBC552766131C1AC05CA.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 12323⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 12403⤵
- Program crash
PID:4000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4984 -ip 49841⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4984 -ip 49841⤵PID:5028