Malware Analysis Report

2024-08-06 08:51

Sample ID 230921-t8596abd69
Target crack jordanX.exe
SHA256 51350034de2aa39cc25c628a5d94736585624e0abe2d4896a521f0f137e8bce3
Tags
elysiumstealer evasion stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

51350034de2aa39cc25c628a5d94736585624e0abe2d4896a521f0f137e8bce3

Threat Level: Known bad

The file crack jordanX.exe was found to be: Known bad.

Malicious Activity Summary

elysiumstealer evasion stealer

ElysiumStealer

ElysiumStealer Support DLL

Modifies visibility of file extensions in Explorer

Loads dropped DLL

Launches sc.exe

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Checks SCSI registry key(s)

Modifies Control Panel

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Modifies registry class

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2023-09-21 16:44

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-09-21 16:44

Reported

2023-09-21 16:47

Platform

win10-20230915-en

Max time kernel

150s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe"

Signatures

ElysiumStealer

stealer elysiumstealer

ElysiumStealer Support DLL

Description Indicator Process Target
N/A N/A N/A N/A

Modifies visibility of file extensions in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-1137129745-4190849146-4270886183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Logs\Runtime.MSIL.1.0.0.0\cc.dll C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
File created C:\Windows\rescache\_merged\4183903823\810424605.pri C:\Windows\system32\taskmgr.exe N/A
File created C:\Windows\rescache\_merged\1601268389\3877292338.pri C:\Windows\system32\taskmgr.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A

Modifies Control Panel

evasion
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1137129745-4190849146-4270886183-1000\Control Panel\Desktop\AutoEndTasks = "1" C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1137129745-4190849146-4270886183-1000\Control Panel\Desktop\HungAppTimeout = "1000" C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1137129745-4190849146-4270886183-1000\Control Panel\Desktop\MenuShowDelay = "0" C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1137129745-4190849146-4270886183-1000\Control Panel\Desktop\WaitToKillAppTimeout = "2000" C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1137129745-4190849146-4270886183-1000\Control Panel\Desktop\LowLevelHooksTimeout = "1000" C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1137129745-4190849146-4270886183-1000\Control Panel\Mouse\MouseHoverTime = "0" C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\Copy To C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\Copy To\ = "{C2FBB630-2971-11D1-A18C-00C04FD75D13}" C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\Move To C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\Move To\ = "{C2FBB631-2971-11D1-A18C-00C04FD75D13}" C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: 33 N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3364 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe C:\Windows\SysWOW64\cmd.exe
PID 3364 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe C:\Windows\SysWOW64\cmd.exe
PID 3364 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe C:\Windows\SysWOW64\cmd.exe
PID 1292 wrote to memory of 1248 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1292 wrote to memory of 1248 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 1292 wrote to memory of 1248 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe

"C:\Users\Admin\AppData\Local\Temp\crack jordanX.exe"

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe" /4

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C sc config "RemoteRegistry" start= disabled

C:\Windows\SysWOW64\sc.exe

sc config "RemoteRegistry" start= disabled

Network

Country Destination Domain Proto
US 8.8.8.8:53 keyauth.win udp
US 104.26.0.5:443 keyauth.win tcp
US 8.8.8.8:53 5.0.26.104.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 27.73.42.20.in-addr.arpa udp
US 8.8.8.8:53 254.177.238.8.in-addr.arpa udp

Files

memory/3364-0-0x00000000738B0000-0x0000000073F9E000-memory.dmp

memory/3364-1-0x0000000000040000-0x0000000000626000-memory.dmp

memory/3364-2-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-3-0x0000000000FE0000-0x0000000000FEC000-memory.dmp

\Windows\Logs\Runtime.MSIL.1.0.0.0\cc.dll

MD5 94173de2e35aa8d621fc1c4f54b2a082
SHA1 fbb2266ee47f88462560f0370edb329554cd5869
SHA256 7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512 cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798

memory/3364-8-0x00000000056A0000-0x0000000005B9E000-memory.dmp

memory/3364-9-0x0000000005090000-0x0000000005122000-memory.dmp

memory/3364-10-0x0000000005010000-0x0000000005022000-memory.dmp

memory/3364-11-0x0000000005070000-0x000000000507A000-memory.dmp

memory/3364-12-0x0000000005260000-0x00000000053D6000-memory.dmp

memory/3364-13-0x0000000005440000-0x0000000005472000-memory.dmp

memory/3364-14-0x0000000006AF0000-0x0000000006B8C000-memory.dmp

memory/3364-15-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-16-0x00000000093A0000-0x00000000093DE000-memory.dmp

memory/3364-17-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-18-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-19-0x00000000738B0000-0x0000000073F9E000-memory.dmp

memory/3364-20-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-21-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-22-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-23-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-24-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-25-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-26-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-27-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-28-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-29-0x0000000009E50000-0x0000000009F50000-memory.dmp

memory/3364-30-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

memory/3364-31-0x0000000009E50000-0x0000000009F50000-memory.dmp

memory/3364-39-0x0000000000C50000-0x0000000000C72000-memory.dmp

memory/3364-40-0x0000000009E50000-0x0000000009F50000-memory.dmp

memory/3364-41-0x0000000009E50000-0x0000000009F50000-memory.dmp