| File name: | 20352dbd9ccbf5f92c6670ce2466942e.exe |
| Full analysis: | https://app.any.run/tasks/cc27f139-761d-43c6-b0db-cd0ea934683b |
| Verdict: | Malicious activity |
| Threats: | Stealc is a stealer malware that targets victims’ sensitive data, which it exfiltrates from browsers, messaging apps, and other software. The malware is equipped with advanced features, including fingerprinting, control panel, evasion mechanisms, string obfuscation, etc. Stealc establishes persistence and communicates with its C2 server through HTTP POST requests. |
| Analysis date: | December 02, 2023, 16:56:24 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 20352DBD9CCBF5F92C6670CE2466942E |
| SHA1: | CD1E7635020841478C59F976260F5D7516CB709F |
| SHA256: | 1E19E42B22CEBBF20EBA654F4FF460D06A903775730416106B8DBD35B41C3C81 |
| SSDEEP: | 6144:UZRn/f5EkZUkDc3rLA0iSLQzgjjMUpfb58iEdfcOXjX6fFXI+rQrc4q:oDEWUkDc33AVSLQzi48DGivXLKc4q |
| .exe | | | Win32 Executable MS Visual C++ (generic) (41) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (36.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.6) |
| .exe | | | Win32 Executable (generic) (5.9) |
| .exe | | | Clipper DOS Executable (2.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:02:05 11:11:45+01:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 178688 |
| InitializedDataSize: | 3793920 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x895e |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 21.0.0.0 |
| ProductVersionNumber: | 34.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Unknown (0373) |
| CharacterSet: | Unknown (63B6) |
| FileDescriptions: | Vellting |
| InternalName: | Bastard.exe |
| LegalTrademark1: | Fractal |
| OriginalFileName: | Lameros.exe |
| ProductName: | Jadocka |
| ProductVersion: | 57.38.26 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2128 | "C:\Users\admin\AppData\Local\Temp\20352dbd9ccbf5f92c6670ce2466942e.exe" | C:\Users\admin\AppData\Local\Temp\20352dbd9ccbf5f92c6670ce2466942e.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
Stealc(PID) Process(2128) 20352dbd9ccbf5f92c6670ce2466942e.exe C2http://77.91.76.36/3886d2276f6914c4.php Keys RC47823385150158962326987040273 Strings (346)" & del "C:\ProgramData\*.dll"" & exit %08lX%04lX%lu %APPDATA% %DESKTOP% %DOCUMENTS% %LOCALAPPDATA% %PROGRAMFILES% %PROGRAMFILES_86% %RECENT% %USERPROFILE% %d/%d/%d %d:%d:%d %hu/%hu/%hu *.ini *.lnk *.tox - Architecture: - CPU: - Computer Name: - Cores: - Country: ISO? - Display Resolution: - GPU: - HWID: - IP: IP? - Keyboards: - Language: - Laptop: - Local Time: - OS: - RAM: - Running Path: - Threads: - UTC: - UserName: .exe .txt /3886d2276f6914c4.php /c start /c timeout /t 5 & del /f /q " /f059ec3d7eb90876/ 00000001 00000002 00000003 00000004 A7FDF864FBC10B77* A92DAA6EA6F891F2* ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890 All Users: BCryptCloseAlgorithmProvider BCryptDecrypt BCryptDestroyKey BCryptGenerateSymmetricKey BCryptOpenAlgorithmProvider BCryptSetProperty BitBlt C:\ProgramData\ C:\ProgramData\nss3.dll C:\Windows\system32\cmd.exe CURRENT CharToOemW CloseHandle CloseWindow CoCreateInstance CoInitialize CoUninitialize Content-Disposition: form-data; name=" Content-Type: multipart/form-data; boundary=---- Cookies CopyFileA CreateCompatibleBitmap CreateCompatibleD CreateDCA CreateEventA CreateFileA CreateStreamOnHGlobal CreateToolhelp32Snapshot CryptBinaryToStringA CryptStringToBinaryA CryptUnprotectData Current User: D877F783D5D3EF8C* DISPLAY DeleteFileA DeleteObject DialogConfig.vdf DialogConfigOverlay*.vdf DisplayName DisplayVersion EnumDisplayDevicesA ExitProcess F8806DD0C461824F* FALSE FindClose FindFirstFileA FindNextFileA FreeLibrary GdipCreateBitmaFromHBITMAP GdipDisposeImage GdipFree GdipGetImageEncoders GdipGetImageEncodersSize GdipSaveImageToStream GdiplusShutdown GdiplusStartup GetComputerNameA GetCurrentProcess GetCurrentProcessId GetDC GetDesktopWindow GetDeviceCaps GetEnvironmentVariableA GetFileAttributesA GetFileSize GetFileSizeEx GetHGlobalFromStream GetKeyboardLayoutList GetLastError GetLocalTime GetLocaleInfoA GetLogicalProcessorInformationEx GetModuleFileNameA GetModuleFileNameExA GetProcAddress GetProcessHeap GetSystemInfo GetSystemPowerStatus GetSystemTime GetTimeZoneInformation GetUserDefaultLangID GetUserDefaultLocaleName GetUserNameA GetVolumeInformationA GetWindowRect GetWindowsDirectoryA GlobalAlloc GlobalFree GlobalLock GlobalMemoryStatusEx GlobalSize HAL9TH HARDWARE\DESCRIPTION\System\CentralProcessor\0 HTTP/1.1 HeapAlloc HeapFree History HttpOpenRequestA HttpSendRequestA IndexedDB Installed Apps: InternetCloseHandle InternetConnectA InternetCrackUrlA InternetOpenA InternetOpenUrlA InternetReadFile IsWow64Process JohnDoe LoadLibraryA Local Extension Settings Local State LocalAlloc LocalFree Login Data MultiByteToWideChar NSS_Init NSS_Shutdown Network Network Info: OpenEventA OpenProcess Opera Opera GX Stable Opera Stable OperaGX PATH PK11SDR_Decrypt PK11_Authenticate PK11_FreeSlot PK11_GetInternalKeySlot POST Password PathMatchSpecA Pidgin Process List: Process32First Process32Next ProcessorNameString ProductName ReadFile RegCloseKey RegEnumKeyExA RegEnumValueA RegOpenKeyExA RegQueryValueExA ReleaseDC RmEndSession RmGetList RmRegisterResources RmStartSession SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies SELECT fieldname, value FROM moz_formhistory SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies SELECT name, value ROM autofill SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards SELECT origin_url, username_value, password_value FROM logins SELECT url FROM moz_places LIMIT 1000 SELECT url FROM urls LIMIT 1000 SHGetFolderPathA SOFTWARE\Microsoft\Windows NT\CurrentVersion SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall SelectObject SetEnvironmentVariableA SetFilePointer ShellExecuteExA Sleep Software\Microsoft\Office\13.0\Outlok\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office\14.0\Outlok\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office\15.0\Outlok\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Office\16.0\Outlok\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\ Software\Valve\Steam SteamPath StrCmpCA StrCmpCW StrStrA Sync Extension Settings System Summary: SystemTimeToFileTime TJwB~1{( TRUE Telegram TerminateProcess User Agents: VMwareVMware VirtualAlloc VirtualAllocExNuma VirtualFree VirtualProtect Web Data WideCharToMultiByte WriteFile Ys`6N \.purple\ \Discord\tokens.txt \Local Storage\leveldb \Local Storage\leveldb\CURRENT \Outlook\accounts.txt \Steam\ \Telegram Desktop\ \Temp\ \config\ \discord\ _0.indexeddb.leveldb accounts.xml advapi32.dll autofill bcrypt.dll browser: browsers build card: chrome chrome-extension_ config.vdf cookies cookies.sqlite crypt32.dll dQw4w9WgXcQ default done encryptedPassword encryptedUsername encrypted_key file file_name files firefox formSubmitURL formhistory.sqlite freebl3.dll gdi32.dll gdiplus.dll guid history http://77.91.76.36 https hwid key_datas libraryfolders.vdf login: logins.json loginusers.vdf lstrcatA lstrcpyA lstrcpynA lstrlenA map* message month: mozglue.dll msvcp140.dll name: nss3.dll ntdll.dll oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\ ole32.dll open opera password: places.sqlite plugins profile: profiles.ini psapi.dll q"`.]uz{P!?:Q rstrtmgr.dll runas screenshot.jpg shell32.dll shlwapi.dll soft softokn3.dll sqlite3.dll sqlite3_close sqlite3_column_blob sqlite3_column_bytes sqlite3_column_text sqlite3_finalize sqlite3_open sqlite3_prepare_v2 sqlite3_step sscanf ssfn* system_info.txt token token: url: user32.dll usernameField vcruntime140.dll wallets wininet.dll wsprintfA wsprintfW year: |"by | |||||||||||||||
| (PID) Process: | (2128) 20352dbd9ccbf5f92c6670ce2466942e.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2128) 20352dbd9ccbf5f92c6670ce2466942e.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2128) 20352dbd9ccbf5f92c6670ce2466942e.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2128) 20352dbd9ccbf5f92c6670ce2466942e.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 46000000C1000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2128) 20352dbd9ccbf5f92c6670ce2466942e.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2128) 20352dbd9ccbf5f92c6670ce2466942e.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2128) 20352dbd9ccbf5f92c6670ce2466942e.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2128) 20352dbd9ccbf5f92c6670ce2466942e.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2128 | 20352dbd9ccbf5f92c6670ce2466942e.exe | POST | 200 | 77.91.76.36:80 | http://77.91.76.36/3886d2276f6914c4.php | unknown | text | 8 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2128 | 20352dbd9ccbf5f92c6670ce2466942e.exe | 77.91.76.36:80 | — | Foton Telecom CJSC | RU | unknown |
PID | Process | Class | Message |
|---|---|---|---|
2128 | 20352dbd9ccbf5f92c6670ce2466942e.exe | Malware Command and Control Activity Detected | ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in |
2128 | 20352dbd9ccbf5f92c6670ce2466942e.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Stealc |