Analysis

  • max time kernel
    52s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 19:53

General

  • Target

    d38546e1c76cf5ad8c20a1bb04063011f8242da4fe227adb9289016162d6b355.exe

  • Size

    1.5MB

  • MD5

    20189630d17250b2cca710af11437270

  • SHA1

    b74ae9a949650f511401127397c2343f110df12b

  • SHA256

    d38546e1c76cf5ad8c20a1bb04063011f8242da4fe227adb9289016162d6b355

  • SHA512

    74a9229e33419448c732f0e563744bffed9448ffaf1f451c6f46da12fc6917742d0be3ce24fefce7c3788bcfc6ce061bdfd00d377d0a533bd99e721f752405e6

  • SSDEEP

    24576:ce3i2Q9NXw2/wPOjdGxYqfw+Jwz/S/6RZs8nVW6k5JHkARt7DBAqnj:NSTq24GjdGSgw+W7SCRnVQTEQ/BA8

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1066488622364250173/8RbucVnreVjoSJX1_fmn2is2vSRLShEVIbbD37OlphPdDueVT9q_ZWOiOPmJmHQOiwFr

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d38546e1c76cf5ad8c20a1bb04063011f8242da4fe227adb9289016162d6b355.exe
    "C:\Users\Admin\AppData\Local\Temp\d38546e1c76cf5ad8c20a1bb04063011f8242da4fe227adb9289016162d6b355.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:836
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
          PID:2044
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          3⤵
            PID:616
          • C:\Windows\SysWOW64\findstr.exe
            findstr All
            3⤵
              PID:856
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1932
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              3⤵
                PID:1028
              • C:\Windows\SysWOW64\netsh.exe
                netsh wlan show networks mode=bssid
                3⤵
                  PID:908
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpD647.tmp.bat
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1028
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  3⤵
                    PID:1924
                  • C:\Windows\SysWOW64\taskkill.exe
                    TaskKill /F /IM 836
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1088
                  • C:\Windows\SysWOW64\timeout.exe
                    Timeout /T 2 /Nobreak
                    3⤵
                    • Delays execution with timeout.exe
                    PID:1600
              • C:\Windows\system32\msiexec.exe
                C:\Windows\system32\msiexec.exe /V
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1796

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\tmpD647.tmp.bat

                      Filesize

                      56B

                      MD5

                      5fecec8a9a855c0ecebda9e331cf88cf

                      SHA1

                      209a6e453ffc38ceee2bcab1d763db4e6b45c01a

                      SHA256

                      62f436c7b02d44184176bda473f1ccbda4b8d315a3b33dbfa6e40a9e493e76e1

                      SHA512

                      a29e669ee20407f014e15ad837281a157979256fb510a6249fda71276ec5ce0f6d9715f4c666cc5af5e65a638ce996f7b6021c96e0d7cf72eff80b8118595a3f

                    • memory/836-66-0x0000000004AF5000-0x0000000004B06000-memory.dmp

                      Filesize

                      68KB

                    • memory/836-55-0x0000000076771000-0x0000000076773000-memory.dmp

                      Filesize

                      8KB

                    • memory/836-70-0x0000000004AF5000-0x0000000004B06000-memory.dmp

                      Filesize

                      68KB

                    • memory/836-54-0x0000000001000000-0x0000000001184000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/836-69-0x00000000069C0000-0x0000000006A42000-memory.dmp

                      Filesize

                      520KB

                    • memory/836-68-0x00000000067F0000-0x00000000068A0000-memory.dmp

                      Filesize

                      704KB

                    • memory/836-67-0x0000000006080000-0x00000000060FA000-memory.dmp

                      Filesize

                      488KB

                    • memory/1796-65-0x000007FEFBF61000-0x000007FEFBF63000-memory.dmp

                      Filesize

                      8KB