Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 03:46

General

  • Target

    Check Mail Linked.exe

  • Size

    3.2MB

  • MD5

    7b267b762d5cda15fb63a73832766a42

  • SHA1

    4f4c86ad03d37a9a1b45229d4bd62c108b7d4f7f

  • SHA256

    645a36290571cebbed208deb679db5e43ceb60d8990a3c7295c1fed487e2325f

  • SHA512

    6e5a6156a77b3d75384795d6b778c3cee241874030488a7633124918f56490cbda616a782417faba6031b50cb20e8223863f8789ae0aaeb86f905a7a247d12dc

  • SSDEEP

    49152:QHYPcTWQ8VK4RS9NoIK4Em0gmiFhRL4ljm/i1CYwG:WYkCQaJ4EmwsL4ljm/MC

Score
10/10

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • ElysiumStealer Support DLL 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Check Mail Linked.exe
    "C:\Users\Admin\AppData\Local\Temp\Check Mail Linked.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3932
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1316 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4928

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll

      Filesize

      40KB

      MD5

      94173de2e35aa8d621fc1c4f54b2a082

      SHA1

      fbb2266ee47f88462560f0370edb329554cd5869

      SHA256

      7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f

      SHA512

      cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798

    • memory/3932-4-0x00000000055C0000-0x0000000005B64000-memory.dmp

      Filesize

      5.6MB

    • memory/3932-12-0x0000000005CE0000-0x0000000005CEA000-memory.dmp

      Filesize

      40KB

    • memory/3932-3-0x00000000010E0000-0x00000000010EC000-memory.dmp

      Filesize

      48KB

    • memory/3932-0-0x0000000074A40000-0x00000000751F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3932-5-0x00000000050B0000-0x0000000005142000-memory.dmp

      Filesize

      584KB

    • memory/3932-6-0x0000000076F10000-0x0000000077000000-memory.dmp

      Filesize

      960KB

    • memory/3932-2-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/3932-1-0x0000000000310000-0x0000000000644000-memory.dmp

      Filesize

      3.2MB

    • memory/3932-7-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/3932-13-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/3932-14-0x0000000074A40000-0x00000000751F0000-memory.dmp

      Filesize

      7.7MB

    • memory/3932-15-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/3932-16-0x0000000076F10000-0x0000000077000000-memory.dmp

      Filesize

      960KB

    • memory/3932-17-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB

    • memory/3932-18-0x0000000005000000-0x0000000005010000-memory.dmp

      Filesize

      64KB