Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2025, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
e6ca63a0cf09a33dcef786430c6184c4.exe
Resource
win7-20241010-en
General
-
Target
e6ca63a0cf09a33dcef786430c6184c4.exe
-
Size
898KB
-
MD5
e6ca63a0cf09a33dcef786430c6184c4
-
SHA1
da8bce6c67ecb86e8ed1aa9d90d9788424d7aada
-
SHA256
204809d4ec414a7e31645f69d870fa8063a780e8aa574d4e70652249a6d27191
-
SHA512
1e5f2d238a865094ccd6b22b458f3c2aae6b685e1a8510f442ba6d3a91d71b165624b438fdd72132b053d0ef93afed6136d4b43a6b1634c8113a6cf79f693bf7
-
SSDEEP
24576:3e04TvlV3TtEUuVtG+aItxpywP8o987KaG6:uNTvlV3otG+aIUi8tG6
Malware Config
Signatures
-
Stealc family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation e6ca63a0cf09a33dcef786430c6184c4.exe -
Executes dropped EXE 1 IoCs
pid Process 3172 U.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1716 tasklist.exe 3804 tasklist.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SteveUsb e6ca63a0cf09a33dcef786430c6184c4.exe File opened for modification C:\Windows\GymRemoved e6ca63a0cf09a33dcef786430c6184c4.exe File opened for modification C:\Windows\ShirtMauritius e6ca63a0cf09a33dcef786430c6184c4.exe File opened for modification C:\Windows\SlovakNebraska e6ca63a0cf09a33dcef786430c6184c4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6ca63a0cf09a33dcef786430c6184c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3172 U.com 3172 U.com 3172 U.com 3172 U.com 3172 U.com 3172 U.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1716 tasklist.exe Token: SeDebugPrivilege 3804 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3172 U.com 3172 U.com 3172 U.com -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3172 U.com 3172 U.com 3172 U.com -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4984 wrote to memory of 4632 4984 e6ca63a0cf09a33dcef786430c6184c4.exe 87 PID 4984 wrote to memory of 4632 4984 e6ca63a0cf09a33dcef786430c6184c4.exe 87 PID 4984 wrote to memory of 4632 4984 e6ca63a0cf09a33dcef786430c6184c4.exe 87 PID 4632 wrote to memory of 116 4632 cmd.exe 89 PID 4632 wrote to memory of 116 4632 cmd.exe 89 PID 4632 wrote to memory of 116 4632 cmd.exe 89 PID 4632 wrote to memory of 1716 4632 cmd.exe 90 PID 4632 wrote to memory of 1716 4632 cmd.exe 90 PID 4632 wrote to memory of 1716 4632 cmd.exe 90 PID 4632 wrote to memory of 5096 4632 cmd.exe 91 PID 4632 wrote to memory of 5096 4632 cmd.exe 91 PID 4632 wrote to memory of 5096 4632 cmd.exe 91 PID 4632 wrote to memory of 3804 4632 cmd.exe 93 PID 4632 wrote to memory of 3804 4632 cmd.exe 93 PID 4632 wrote to memory of 3804 4632 cmd.exe 93 PID 4632 wrote to memory of 5036 4632 cmd.exe 94 PID 4632 wrote to memory of 5036 4632 cmd.exe 94 PID 4632 wrote to memory of 5036 4632 cmd.exe 94 PID 4632 wrote to memory of 1060 4632 cmd.exe 95 PID 4632 wrote to memory of 1060 4632 cmd.exe 95 PID 4632 wrote to memory of 1060 4632 cmd.exe 95 PID 4632 wrote to memory of 2012 4632 cmd.exe 96 PID 4632 wrote to memory of 2012 4632 cmd.exe 96 PID 4632 wrote to memory of 2012 4632 cmd.exe 96 PID 4632 wrote to memory of 4272 4632 cmd.exe 97 PID 4632 wrote to memory of 4272 4632 cmd.exe 97 PID 4632 wrote to memory of 4272 4632 cmd.exe 97 PID 4632 wrote to memory of 2116 4632 cmd.exe 98 PID 4632 wrote to memory of 2116 4632 cmd.exe 98 PID 4632 wrote to memory of 2116 4632 cmd.exe 98 PID 4632 wrote to memory of 2708 4632 cmd.exe 99 PID 4632 wrote to memory of 2708 4632 cmd.exe 99 PID 4632 wrote to memory of 2708 4632 cmd.exe 99 PID 4632 wrote to memory of 3172 4632 cmd.exe 100 PID 4632 wrote to memory of 3172 4632 cmd.exe 100 PID 4632 wrote to memory of 3172 4632 cmd.exe 100 PID 4632 wrote to memory of 2928 4632 cmd.exe 101 PID 4632 wrote to memory of 2928 4632 cmd.exe 101 PID 4632 wrote to memory of 2928 4632 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6ca63a0cf09a33dcef786430c6184c4.exe"C:\Users\Admin\AppData\Local\Temp\e6ca63a0cf09a33dcef786430c6184c4.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c expand Buys.mp3 Buys.mp3.bat & Buys.mp3.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\expand.exeexpand Buys.mp3 Buys.mp3.bat3⤵
- System Location Discovery: System Language Discovery
PID:116
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:5096
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:5036
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3451603⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Wins.mp33⤵
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "Hence" Instruction3⤵
- System Location Discovery: System Language Discovery
PID:4272
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 345160\U.com + Experiencing + Potter + Presenting + Pioneer + Worldwide + Answering + Viewed + Calgary 345160\U.com3⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Periods.mp3 + ..\Seminar.mp3 + ..\Utilize.mp3 + ..\Stem.mp3 + ..\Screenshots.mp3 + ..\Mentor.mp3 z3⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\345160\U.comU.com z3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3172
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
348KB
MD5c0bb258524396804ea93f340856909a2
SHA127f3f59df4f34348cffc9893b6fc675d56b6eafa
SHA256c9dda6f8dc5ad4eb31137d13c9c2c7b3725d7a19fdac53baf7328ff0dfda217d
SHA51237ca23434e328c3d5679a2f4d459e8d2af1262c5abaf14db1b2709e887928f1e943493383a108d8b5db29b7d80ac523bb9b4e204155037a9799eda0ace02c621
-
Filesize
134KB
MD58cbb50e6f3835bdeabb8391dd4546357
SHA11f65c558ea1ada18bc90db73da146ae7ab6cfd69
SHA25611c341d9eab153254842318be1d87bfd9ce018e57779d485c9470a16e27e7931
SHA5128e925bcacd44820014f253004e40bbc254b063078af0891e66b66514ea70fac79e77479f9706ea43687a9c385d2eecc97832cc50cdd071d9fc854d34b6578e3a
-
Filesize
47KB
MD5da978e82b21d766c53a503d62e8004b3
SHA1cd0af0d1450272324811d2db93e57e2e0a2664f2
SHA256db741b2733fa63749963738b3f5a1ec4064fa35122554dd5c5712269a398ae57
SHA512d1aad296b6e326855fadb9d27c893108268449bc754b9db088e0859e6b22e936ecca1e187c502faab85b40c9a73fff0812f17c32f9d65d8bafcfaecc62c996f1
-
Filesize
127KB
MD5d628a2162b8acb4dd7624d7263da250b
SHA1a476eff09f1366887ce80ee1aba0faa7859ff51a
SHA2562e1a4d4ea0266a791b14478dab848b8ed713589c2d773d27bdc93745d9812e6c
SHA512d0f52d3b7bc2084bf350d8294307da600f18d5a389ae9bb7d430b5b014ffe140fb7f6ca9122e0166eb4c498c74bd11cde66233010b9c1a3af7b5a019115a52ed
-
Filesize
1KB
MD5d14ed41d0367b5d855c423a3412a6852
SHA12b08a2d7e8892e647806f6dfd03ef437eb24f880
SHA25662639c23b1102a1b3dfc6fe3e2b3d1b319eecdcc4b0376d45d7fdcc8ebe8d83e
SHA512d1c23e9e21594e3dba49d01a1013d58b74c1b3aad4ed0be8f0c64143c96683f87e928b105bdd389b4f6a5d72d39cc4627e8206a9eb4bc5732591ec96033f1788
-
Filesize
4KB
MD53141efb5001e156e0519ec938d4d80b3
SHA1f075222d64efde7bc74e2db94051a30b1d875412
SHA2560ece99b5da4867d19e274ea3f4abe1eea6bd8aa0f1af99bae3376b37ed63e78f
SHA5121c4359664a1b8798a70c744e97da26b298a03d95e43b6027be4a5bf4a1f88bae9f92e030d8988a3b468e7327113dbe79fda231a01bcc6a078faec04b794468e0
-
Filesize
65KB
MD5e7d41106dafd5bfde2a15d45373e3dc7
SHA1dda4294886bddaca7d9f56bf7e395872ce4125a1
SHA25650617e532cb1a7ab8bf6047c15c693d36b6106faf5ea3b23769b3196a4e1c837
SHA51208d83e7c1e5746452641117b96fb1c0000894925f2f34c222ed89a3bc8aa1c80dd6ccfc056f892a10c87fdeeb02f46d7c4dd70c00d2b9a5be6f93a5ef0a5fda6
-
Filesize
94KB
MD57a1347efb537a6b1da27849805c55b9e
SHA19c90c7de81868d728feb7dcfdad6b6a8cc0bdd78
SHA2569d635aa27635cb7673acd3dfb4ce51828d65c54327d4b9b74d9c1341d3657719
SHA5123bb0a687d4b099bb24c46bb6be93b40d41e8eec3837e2eed2ee250ac5ce044d35a94986e97362fa134eddd7d314c18be5a1aade4483236a2f3e105dd3f06de9a
-
Filesize
131KB
MD5dbd587032050e341aa1dc99fb3d5791a
SHA137be8f8066c9888f630ef22ed2586d20a4cf14bf
SHA256c42858dcc624fcfd0fc73ef0afa1fd311309c3482cfc76727e0621f6e3adc8ef
SHA512ce94631778777875c12dcea4938ff89acbf5f21cc64bb7ea5ae72ac0c4377c06b4f3bd192e00ad9720736b3eece9b03ddf291fe39b8c2c9733d82b29e899ee5a
-
Filesize
127KB
MD58ddf4558ec0ba8fb0de9f862b85724d6
SHA160f0c21b527d3190d1aa181d846ae5a03bb1fbe7
SHA2564b814bef2c7c998126d7494cb5b9f3dc51ccf742c3810815e06333ab2a2bafb9
SHA512abfd9585d1fc7b7bc0f2601ce187465d6fee00174577425d09e3aa198fc702f4a6a8355a5869e2b77905cb06b2fb38f4b9437bc168fc08fb511e54e42f882890
-
Filesize
75KB
MD5a8aa3ffd8462e3083b1f7f99750ab726
SHA1e65fc8a695092d34a943b4ebbcfd9c2d2e45e661
SHA2563fd2f4309a6bb48975c774a23ddb149b9bebc555f777bc6813fc7015fafe97e3
SHA512c12213166a042e451a4e65032074bc45addf930ad91ee28f75fc65d049e1a041a8fffde9e0916f65c94767d2adbd257416bc0f24e14490b2b2b34cd8c3951ac2
-
Filesize
73KB
MD544088744c5da1027fae77b4e3b4893c7
SHA113eff7a20b72c15efad8ccd3120a0764a0dac285
SHA256e0fa3de7dc4383e95304055d48ba8cae41c3b6de2bb7a25783eca72cd6190616
SHA512be8f13daffccc884addbe94559231782fbd7beeff41a34160e9ada50ed8da222938e8417d7f092746e2c16be791cf9e3010a1b4e8f71ca7bf4493756369ac68b
-
Filesize
74KB
MD5c9db0bf5c99cb6e4fb631124aea25afa
SHA132130b1931d635de7ae8b1b1cf0b7a62c7aa531c
SHA256d87cccbe473c8107aa187417ff61415fe211d8a1c691c0dbfe101457121a3e9c
SHA51233b9caf64fa86ab71685d7c3e3e3410ad8b24f91ec74145b4673d82d79af3045c11742acc9072acb8876b4bd46968c42caadf46100103d8482f4c5bf9061218f
-
Filesize
57KB
MD57de5bb2de8e6970abe1a3f09ae1e7e51
SHA1c46a388a720b8cee06178b9f7d5afd977548c80a
SHA25690c455f80a2f4335e2201f8b8a7959dbb728d3b88e9156e04e803bd5c272b588
SHA512bf8fa2fcd0c7496acfc7870079ed2e08b82d65ad437b618858950fc014e40d7b2fb80d3efa66439172b9119562fcdc385cb4c5a0ca2c39d379703cc0b09c59cf
-
Filesize
117KB
MD528c47995b94677b3b7d1c2c0df232c79
SHA11e339b48d46c837bf7cf8e2f2b0f81d2d55c4baf
SHA25635db6dd9aa1f1b0a91c6a4098a1bceb11722198b3d51d2981c3cb3b6ddbc5fcf
SHA5128da091f1fdca1fe835deb1f87fc45ff095a30d965683e79e36f4d58a859120ce415172887153acc2cd80d2fb9fa2cea60a510711df80f2d8cdb49c16c0f634be
-
Filesize
475KB
MD542b42ead05f92d12bce8d3de3124e08c
SHA1ca0f93f5f87398a3691886125f13cdd66641122a
SHA256ea2302db685e20ffe83208f96c3c1fe87cba6e34f6ac8da875cc275d5ab75167
SHA512c8219203cfc76703433a0fecd9cfcdb244d3236a7893c3c946d821d63970ad1770c583dcaed951daf59753d828125fcbc6dc314eb3a86cd18ab85bcda118d6be
-
Filesize
146KB
MD56842907ca155f0a76872f3c3cd56c2b0
SHA16c10176a0c6a2942270e6220bc9df65c6e1a7f98
SHA256f73b1257c366a4837798e2592446ffd6c240709fa59a3f61379e6f2ab290ebe6
SHA512ab024ae7c30e35b7ff36919c43748057eff34ee38815df6c229febd783099065dc5e87f80a26406dcd14c7f3dbfc302035066aab96cfe8d3a10154c40975eb03
-
Filesize
15KB
MD564e0488415a5f90bf7ef637e309a0edd
SHA1a4cec8094cb195369b59978c6faf797fc050120b
SHA256c8a74cd90ea4645f4cf89acf692bdb84f856bd8e239b98328eb1d8f9d7534541
SHA5121cf2a355a77642b35cdd86e26eac53de9e47273e3edd365f55fc04ba689410f30bce02bdc14f7d89e609eb7acefb381f4aa575d93244b3f768dd871cfba80542