Analysis
-
max time kernel
91s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
46DD34531761BBC552766131C1AC05CA.exe
Resource
win7-20240903-en
General
-
Target
46DD34531761BBC552766131C1AC05CA.exe
-
Size
4.2MB
-
MD5
46dd34531761bbc552766131c1ac05ca
-
SHA1
77de42cebb838e1c33baf9e05dffcc72b193ec8e
-
SHA256
bf142408e335b4fe9f03495b4eaf5629b30f8d9c7433c44b7532d42c67b4ad3f
-
SHA512
73f55f275b3d5220ccecb14fb2466a816ad14abfc863764b81be425b366f0681f693339fd15613761a997be1e6d78e2d72cea3282bb50dca54472ae5aac68f17
-
SSDEEP
49152:ImwTL1n769zo6wqdvplsq9oLc9sf/sygrCqEVjOCszxGsbcKPkQxnK:gLJ96BOc9B4KcK8cn
Malware Config
Extracted
stealc
meetvoov
http://185.216.71.4
-
url_path
/feed7c30357659ed.php
Signatures
-
Stealc family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3124 set thread context of 972 3124 46DD34531761BBC552766131C1AC05CA.exe 91 -
Program crash 2 IoCs
pid pid_target Process procid_target 828 972 WerFault.exe 91 2128 972 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46DD34531761BBC552766131C1AC05CA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 972 BitLockerToGo.exe 972 BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3124 wrote to memory of 972 3124 46DD34531761BBC552766131C1AC05CA.exe 91 PID 3124 wrote to memory of 972 3124 46DD34531761BBC552766131C1AC05CA.exe 91 PID 3124 wrote to memory of 972 3124 46DD34531761BBC552766131C1AC05CA.exe 91 PID 3124 wrote to memory of 972 3124 46DD34531761BBC552766131C1AC05CA.exe 91 PID 3124 wrote to memory of 972 3124 46DD34531761BBC552766131C1AC05CA.exe 91 PID 3124 wrote to memory of 972 3124 46DD34531761BBC552766131C1AC05CA.exe 91 PID 3124 wrote to memory of 972 3124 46DD34531761BBC552766131C1AC05CA.exe 91 PID 3124 wrote to memory of 972 3124 46DD34531761BBC552766131C1AC05CA.exe 91 PID 3124 wrote to memory of 972 3124 46DD34531761BBC552766131C1AC05CA.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\46DD34531761BBC552766131C1AC05CA.exe"C:\Users\Admin\AppData\Local\Temp\46DD34531761BBC552766131C1AC05CA.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 12123⤵
- Program crash
PID:828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 12243⤵
- Program crash
PID:2128
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 972 -ip 9721⤵PID:2620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 972 -ip 9721⤵PID:3008