| download: | /photo.zip |
| Full analysis: | https://app.any.run/tasks/9b636bf1-5752-4000-91dd-edc8c67334b8 |
| Verdict: | Malicious activity |
| Threats: | Stealc is a stealer malware that targets victims’ sensitive data, which it exfiltrates from browsers, messaging apps, and other software. The malware is equipped with advanced features, including fingerprinting, control panel, evasion mechanisms, string obfuscation, etc. Stealc establishes persistence and communicates with its C2 server through HTTP POST requests. |
| Analysis date: | August 08, 2024, 11:08:14 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=deflate |
| MD5: | B8B46BFDDBCC278FD97EBDA1780D9C92 |
| SHA1: | 36F7ADFBF1F0D76064C7A9A3A5C97BAC0975E0AF |
| SHA256: | 2D427BC288585259AD26F06AF9F1106232EEB54706C16D32F86747DCCDEE1BE4 |
| SSDEEP: | 98304:Zsq4CaScknBGQK8Z7ggd9msCUDvOIQH37JjKeseTK6S1u265lj5Ae7Bt+uQiZQiK:+QSXDr+anf33dYKj9L5iDx/ |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2024:08:06 15:51:34 |
| ZipCRC: | 0x49a6fa02 |
| ZipCompressedSize: | 6992185 |
| ZipUncompressedSize: | 18706432 |
| ZipFileName: | 0Photography.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3140 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa6528.16942\0Photography.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa6528.16942\0Photography.exe | — | WinRAR.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Store Installer Exit code: 666 Version: 22406.625.4.0 Modules
| |||||||||||||||
| 6472 | C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe | 0Photography.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: BitLocker To Go Reader Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6528 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\photo.zip | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| (PID) Process: | (6528) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (6528) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (6528) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (6528) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\photo.zip | |||
| (PID) Process: | (6528) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (6528) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (6528) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (6528) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (6528) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (6528) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3140 | 0Photography.exe | C:\Users\Public\Libraries\ldbad.scif | — | |
MD5:— | SHA256:— | |||
| 3140 | 0Photography.exe | C:\Users\Public\Libraries\pbaoc.scif | — | |
MD5:— | SHA256:— | |||
| 6528 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6528.16942\7z.dll | executable | |
MD5:4E35A902CA8ED1C3D4551B1A470C4655 | SHA256:77222E81CB7004E8C3E077AADA02B555A3D38FB05B50C64AFD36CA230A8FD5B9 | |||
| 6528 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6528.16942\RarExt.dll | executable | |
MD5:9EA95C0A09B40FDD8F51A892C4B6AA10 | SHA256:94B0B503A87C0B9F4B4E14666C9771D939867634FD4832B041E5E0F54B080E1B | |||
| 6528 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6528.16942\RarLng.dll | executable | |
MD5:98BBEBE35280DD5E20AE4FE4DA3524E1 | SHA256:A3666B7F714EB663374982837A117B44329A4861623F313272D825EF90257D23 | |||
| 6528 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6528.16942\VBoxHeadless.dll | executable | |
MD5:9E165368876F944383F52C7D213563E6 | SHA256:0AA2E1BC3221796328E6C83FC061A679FF266DB74A7FD79F5E87F8EC54AA1E23 | |||
| 6528 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6528.16942\VBoxHostChannel.dll | executable | |
MD5:BF8CF948740F9DBEBED169AB8FA4CBE6 | SHA256:B2723D1B22A498A7BD59A807A1B97E6B03C00FBDA53D3A9715C95B224A2BDB3F | |||
| 6528 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6528.16942\UnityEngine.SubsystemsModule.dll | executable | |
MD5:6AA4142D4F9D57D519898DD37535790D | SHA256:A56FE737306BE73AE70F96D6A560ECD7D77F9BA8C2168F1205AB1F4D22E10DFB | |||
| 6528 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6528.16942\UnityEngine.SubstanceModule.dll | executable | |
MD5:7E46D09EC1D86ED8063E8452BD53CEB3 | SHA256:83BDE716CA0F4D93751913C7AD58A91B750B0A14D46D379FCEF91EEDE0EB5296 | |||
| 6528 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6528.16942\0Photography.exe | executable | |
MD5:71A7FAD1908E4109FAFD551D4C840086 | SHA256:5D53CBBEAA975A9EF41F8F2F5201A3F30ADF2120FA12495920940771395CDFB6 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5336 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
5484 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5484 | svchost.exe | GET | 304 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6848 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
6896 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
6472 | BitLockerToGo.exe | GET | 200 | 193.176.153.234:80 | http://193.176.153.234/ | unknown | — | — | unknown |
6472 | BitLockerToGo.exe | POST | 200 | 193.176.153.234:80 | http://193.176.153.234/587ec30955d49a9c.php | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3028 | svchost.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5244 | RUXIMICS.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2120 | MoUsoCoreWorker.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
3028 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5336 | SearchApp.exe | 92.123.104.56:443 | www.bing.com | Akamai International B.V. | DE | unknown |
5336 | SearchApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
5484 | svchost.exe | 40.126.32.134:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
th.bing.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6472 | BitLockerToGo.exe | Malware Command and Control Activity Detected | STEALER [ANY.RUN] Stealc HTTP POST Request |
6472 | BitLockerToGo.exe | Malware Command and Control Activity Detected | ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in |