Analysis
-
max time kernel
104s -
max time network
151s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
29/03/2025, 13:14 UTC
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win11-20250313-en
General
-
Target
random.exe
-
Size
1.7MB
-
MD5
d20eda67a0693cb56f7cb8155259683c
-
SHA1
e444a87e49ce539a49945abefeedf9e319cabb7d
-
SHA256
fe6a1c9f0ba36efc7359452d246e2362492663eb469467632a116f98921cd6a3
-
SHA512
5ac74605b396abd76dcdc70379a45878ef4bdefbcd2d5032593f22d91a98a0a4f8df81d68b68b94880f9405e92d1a7f8b0148c784a1d94cc48f04b7372334209
-
SSDEEP
24576:oBv68FkWFoVWtNQVudpyYuvt39oQ2/1f7F/iZnKzr0eu18sEAIwOnUH:cCek8SWtqVudTUqjf78Znefu1sj
Malware Config
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000\Software\Wine random.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4500 random.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4500 random.exe 4500 random.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4500
Network
-
Remote address:45.93.20.28:80RequestGET / HTTP/1.1
Host: 45.93.20.28
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 0
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.93.20.28:80RequestPOST /85a1cacf11314eb8.php HTTP/1.1
Content-Type: multipart/form-data; boundary=----CFBAKEHIEBKJJJJJKKKE
Host: 45.93.20.28
Content-Length: 210
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 8
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Requestc.pki.googIN AResponsec.pki.googIN CNAMEpki-goog.l.google.compki-goog.l.google.comIN A142.250.187.195
-
Remote address:142.250.187.195:80RequestGET /r/r1.crl HTTP/1.1
Cache-Control: max-age = 3000
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMT
User-Agent: Microsoft-CryptoAPI/10.0
Host: c.pki.goog
ResponseHTTP/1.1 304 Not Modified
Expires: Sat, 29 Mar 2025 14:01:00 GMT
Age: 493
Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
Cache-Control: public, max-age=3000
Vary: Accept-Encoding
-
1.0kB 677 B 10 6
HTTP Request
GET http://45.93.20.28/HTTP Response
200HTTP Request
POST http://45.93.20.28/85a1cacf11314eb8.phpHTTP Response
200 -
384 B 354 B 4 3
HTTP Request
GET http://c.pki.goog/r/r1.crlHTTP Response
304