Overview
overview
7Static
static
Stealerium.zip
windows10-1703-x64
1Builder.deps.json
windows10-1703-x64
3Builder.exe
windows10-1703-x64
1Builder.exe
windows10-1703-x64
1Builder.pdb
windows10-1703-x64
3Builder.ru...g.json
windows10-1703-x64
3Mono.Cecil.Mdb.dll
windows10-1703-x64
1Mono.Cecil.Pdb.dll
windows10-1703-x64
1Mono.Cecil.Rocks.dll
windows10-1703-x64
1Mono.Cecil.dll
windows10-1703-x64
1Spectre.Console.dll
windows10-1703-x64
1Stub/stub.exe
windows10-1703-x64
7Stub/stub.exe.config
windows10-1703-x64
3Analysis
-
max time kernel
53s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
21-11-2022 22:36
Static task
static1
Behavioral task
behavioral1
Sample
Stealerium.zip
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
Builder.deps.json
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
Builder.exe
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
Builder.exe
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
Builder.pdb
Resource
win10-20220901-en
Behavioral task
behavioral6
Sample
Builder.runtimeconfig.json
Resource
win10-20220812-en
Behavioral task
behavioral7
Sample
Mono.Cecil.Mdb.dll
Resource
win10-20220812-en
Behavioral task
behavioral8
Sample
Mono.Cecil.Pdb.dll
Resource
win10-20220901-en
Behavioral task
behavioral9
Sample
Mono.Cecil.Rocks.dll
Resource
win10-20220812-en
Behavioral task
behavioral10
Sample
Mono.Cecil.dll
Resource
win10-20220812-en
Behavioral task
behavioral11
Sample
Spectre.Console.dll
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
Stub/stub.exe
Resource
win10-20220901-en
Behavioral task
behavioral13
Sample
Stub/stub.exe.config
Resource
win10-20220812-en
General
-
Target
Builder.deps.json
-
Size
1KB
-
MD5
c08654c444bdf1cba630e6c7b3d9e20e
-
SHA1
c85db15540bbee453e22f0d367f19cd8892e9764
-
SHA256
91d6e23c3aba1d4f9725275c32257b9a272f07e5d761446499561415158ffbd3
-
SHA512
e4412f28f54bcc42ade8f009adfeba01868ac84b67aed668853ec39e920dfe166ea71badc1cda8c2fb974855906f8152672ce08b36d387ba62a5d9a1a3fdf020
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 400 OpenWith.exe