Resubmissions

19-06-2024 21:00

240619-ztfnva1fkd 10

19-06-2024 20:53

240619-zpdnpawalj 10

19-06-2024 20:28

240619-y876zazfpd 10

Analysis

  • max time kernel
    359s
  • max time network
    333s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-06-2024 20:53

General

  • Target

    hijackloader_stealc_new_hash.exe

  • Size

    922KB

  • MD5

    4081d00fabf6ba8e9eb58202ea053735

  • SHA1

    22afaf01961b36e741d104bd3b96ce8df4fbf519

  • SHA256

    ef62979af506ec3ac2c176bc667465940ca4a1e4f8229e0bc992fec715d43ae8

  • SHA512

    1434efa23afd3cb95d0a55a17b246cbee0179072660ce0458701cf9b3b8075217b0864be09a2bbc428c2b9f2253cace6361f874ad8f1d2f472f9f34bd0bc4eda

  • SSDEEP

    24576:e8inyEBCZN5hoVlnJXzJ/SEVSoMAALia4:DgABuxF/SRF4

Malware Config

Extracted

Family

stealc

Botnet

cozy15

C2

http://193.163.7.88

Attributes
  • url_path

    /a69d09b357e06b52.php

Signatures

  • Detects HijackLoader (aka IDAT Loader) 1 IoCs
  • HijackLoader

    HijackLoader is a multistage loader first seen in 2023.

  • Stealc

    Stealc is an infostealer written in C++.

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hijackloader_stealc_new_hash.exe
    "C:\Users\Admin\AppData\Local\Temp\hijackloader_stealc_new_hash.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\SysWOW64\cmd.exe
      2⤵
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
          PID:4012
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4464
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2164

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ibyitawl.2up.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\a34d791a
      Filesize

      861KB

      MD5

      4ebe8fc86c2e9fe9a1a54b8873d1e61a

      SHA1

      00801897c657083cef0b54d661013bf491bdc497

      SHA256

      6776548198efb97abbfdfc0627d00b555fab07b3d79fe0bbe97f0a5bd7fe9bdd

      SHA512

      5bb3fee714a80fc9f3d5d9e23436f16f08a5cb8dd2aa00a765bfe8fdd4642b30de9196ff11668b390c345dde47ee19de4a58b1d62032cef0deec23de772ad01e

    • memory/960-24-0x0000000074C71000-0x0000000074C7F000-memory.dmp
      Filesize

      56KB

    • memory/960-35-0x0000000074C71000-0x0000000074C7F000-memory.dmp
      Filesize

      56KB

    • memory/960-33-0x0000000074C70000-0x0000000074DEB000-memory.dmp
      Filesize

      1.5MB

    • memory/960-29-0x0000000074C70000-0x0000000074DEB000-memory.dmp
      Filesize

      1.5MB

    • memory/960-28-0x0000000074C70000-0x0000000074DEB000-memory.dmp
      Filesize

      1.5MB

    • memory/960-26-0x00007FFAFF090000-0x00007FFAFF285000-memory.dmp
      Filesize

      2.0MB

    • memory/2164-51-0x00000209D5450000-0x00000209D5451000-memory.dmp
      Filesize

      4KB

    • memory/2164-55-0x00000209D5450000-0x00000209D5451000-memory.dmp
      Filesize

      4KB

    • memory/2164-53-0x00000209D5450000-0x00000209D5451000-memory.dmp
      Filesize

      4KB

    • memory/2164-54-0x00000209D5450000-0x00000209D5451000-memory.dmp
      Filesize

      4KB

    • memory/2164-45-0x00000209D5450000-0x00000209D5451000-memory.dmp
      Filesize

      4KB

    • memory/2164-52-0x00000209D5450000-0x00000209D5451000-memory.dmp
      Filesize

      4KB

    • memory/2164-44-0x00000209D5450000-0x00000209D5451000-memory.dmp
      Filesize

      4KB

    • memory/2164-50-0x00000209D5450000-0x00000209D5451000-memory.dmp
      Filesize

      4KB

    • memory/2164-46-0x00000209D5450000-0x00000209D5451000-memory.dmp
      Filesize

      4KB

    • memory/2164-56-0x00000209D5450000-0x00000209D5451000-memory.dmp
      Filesize

      4KB

    • memory/2272-3-0x0000000074C82000-0x0000000074C84000-memory.dmp
      Filesize

      8KB

    • memory/2272-0-0x00000000007C0000-0x00000000008A8000-memory.dmp
      Filesize

      928KB

    • memory/2272-2-0x00007FFAFF090000-0x00007FFAFF285000-memory.dmp
      Filesize

      2.0MB

    • memory/2272-1-0x0000000074C70000-0x0000000074DEB000-memory.dmp
      Filesize

      1.5MB

    • memory/2272-4-0x0000000074C70000-0x0000000074DEB000-memory.dmp
      Filesize

      1.5MB

    • memory/2272-22-0x0000000074C70000-0x0000000074DEB000-memory.dmp
      Filesize

      1.5MB

    • memory/4012-34-0x0000000000230000-0x000000000046C000-memory.dmp
      Filesize

      2.2MB

    • memory/4012-36-0x00007FFAFF090000-0x00007FFAFF285000-memory.dmp
      Filesize

      2.0MB

    • memory/4012-37-0x0000000000230000-0x000000000046C000-memory.dmp
      Filesize

      2.2MB

    • memory/4012-40-0x0000000000230000-0x000000000046C000-memory.dmp
      Filesize

      2.2MB

    • memory/4464-19-0x00007FFADFD30000-0x00007FFAE07F1000-memory.dmp
      Filesize

      10.8MB

    • memory/4464-32-0x00007FFADFD30000-0x00007FFAE07F1000-memory.dmp
      Filesize

      10.8MB

    • memory/4464-31-0x00007FFADFD33000-0x00007FFADFD35000-memory.dmp
      Filesize

      8KB

    • memory/4464-21-0x000001CC4CA70000-0x000001CC4CAE6000-memory.dmp
      Filesize

      472KB

    • memory/4464-20-0x000001CC4C9A0000-0x000001CC4C9E4000-memory.dmp
      Filesize

      272KB

    • memory/4464-18-0x00007FFADFD30000-0x00007FFAE07F1000-memory.dmp
      Filesize

      10.8MB

    • memory/4464-17-0x000001CC4BC70000-0x000001CC4BC92000-memory.dmp
      Filesize

      136KB

    • memory/4464-7-0x00007FFADFD33000-0x00007FFADFD35000-memory.dmp
      Filesize

      8KB