Overview
overview
10Static
static
10quarantine...K.html
windows7-x64
3quarantine...K.html
windows10-2004-x64
3quarantine...C.html
windows7-x64
3quarantine...C.html
windows10-2004-x64
3quarantine...24.exe
windows7-x64
4quarantine...24.exe
windows10-2004-x64
5setup.exe
windows7-x64
1setup.exe
windows10-2004-x64
7quarantine/ht.exe
windows7-x64
10quarantine/ht.exe
windows10-2004-x64
10quarantine...Yj.exe
windows7-x64
10quarantine...Yj.exe
windows10-2004-x64
10quarantine/pic5.exe
windows7-x64
6quarantine/pic5.exe
windows10-2004-x64
6quarantine...m.html
windows7-x64
3quarantine...m.html
windows10-2004-x64
3quarantine/random.exe
windows7-x64
quarantine/random.exe
windows10-2004-x64
quarantine..._2.exe
windows7-x64
3quarantine..._2.exe
windows10-2004-x64
3quarantine..._3.exe
windows7-x64
10quarantine..._3.exe
windows10-2004-x64
10quarantine....0.exe
windows7-x64
10quarantine....0.exe
windows10-2004-x64
10quarantine...r.html
windows7-x64
3quarantine...r.html
windows10-2004-x64
3quarantine...g.html
windows7-x64
3quarantine...g.html
windows10-2004-x64
3quarantine...t.html
windows7-x64
3quarantine...t.html
windows10-2004-x64
3Analysis
-
max time kernel
29s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2025 19:31
Behavioral task
behavioral1
Sample
quarantine/BSFiC9K.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
quarantine/BSFiC9K.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
quarantine/ORaMflC.html
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
quarantine/ORaMflC.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
quarantine/Setup_2024.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
quarantine/Setup_2024.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
setup.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
quarantine/ht.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
quarantine/ht.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
quarantine/m5UP2Yj.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
quarantine/m5UP2Yj.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
quarantine/pic5.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
quarantine/pic5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
quarantine/random.html
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
quarantine/random.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
quarantine/random.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
quarantine/random.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
quarantine/random_2.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
quarantine/random_2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
quarantine/random_3.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
quarantine/random_3.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
quarantine/rh_0.8.0.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
quarantine/rh_0.8.0.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
quarantine/sgu7U1r.html
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
quarantine/sgu7U1r.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
quarantine/xB2HL9g.html
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
quarantine/xB2HL9g.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
quarantine/xclient.html
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
quarantine/xclient.html
Resource
win10v2004-20250217-en
General
-
Target
quarantine/m5UP2Yj.exe
-
Size
1.7MB
-
MD5
74183fecff41da1e7baf97028fee7948
-
SHA1
b9a7c4a302981e7e447dbf451b7a8893efb0c607
-
SHA256
04032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a
-
SHA512
9aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584
-
SSDEEP
49152:nKejB4Y9a+rOZ3jDptJx1LXVQL079kWi:KjYdrOZ/VL2LMk
Malware Config
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Signatures
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ m5UP2Yj.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion m5UP2Yj.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine m5UP2Yj.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4948 m5UP2Yj.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4396 4948 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m5UP2Yj.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 m5UP2Yj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString m5UP2Yj.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4948 m5UP2Yj.exe 4948 m5UP2Yj.exe 4948 m5UP2Yj.exe 4948 m5UP2Yj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\quarantine\m5UP2Yj.exe"C:\Users\Admin\AppData\Local\Temp\quarantine\m5UP2Yj.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 15282⤵
- Program crash
PID:4396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4948 -ip 49481⤵PID:2056