Resubmissions

22-03-2024 17:46

240322-wcdldaed78 10

22-03-2024 13:04

240322-qaz4pseb4w 10

Analysis

  • max time kernel
    45s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-03-2024 13:04

General

  • Target

    AutoClick.exe

  • Size

    1.8MB

  • MD5

    18082775ad95b33564a1129ecd3caf9a

  • SHA1

    2197f396533b532e044eb271c333985da1fd3675

  • SHA256

    9651a812e057af1920b6700e3ef0c6b6bc147c65be3546d9ab0900dedd0be1b6

  • SHA512

    8bfc97d454aa11aacef3bb14e24bb0fb5df0f86cc7ba24241571b708d54dd50a31578ae008c1fa20fd0a868f039e84599aaf06a19d4959e223972bc9952cc6a5

  • SSDEEP

    49152:37Ckt5baqAC/8yfMSpvoY+b5MreCb9Eb36Sn:3X5balCTDAYPXbCz6C

Score
10/10

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • ElysiumStealer Support DLL 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AutoClick.exe
    "C:\Users\Admin\AppData\Local\Temp\AutoClick.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://discord.com/channels/@me/1215613732093165578
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca360b531ae226312b87dbc8e3097fea

    SHA1

    f10529b090df1b783ff8fae80668045ade689a03

    SHA256

    ecb5b0a0c2edfd7923448d01048f1e221c9e1f5de54cc6dafc615cae3dff6acc

    SHA512

    4e6f0a17bc7b120dbe0e9932a772347dfdf42ffdb97fa4226c3d177275315d053805c94d46bba0aecfd8c9d9464505124df855dd1b52ad9d146b8d85f1a211da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    567318843e2a8bd7e272e1b46d37e1af

    SHA1

    a8cbf466451c8badcf715648a625d022e7d21841

    SHA256

    1451fe3bcbb626b291338a166d011cf4ec15de50fcb2a9f88ba1b1376e6a180d

    SHA512

    0289c24e02e90959dc94f5b33e538e0b13d4a267f91f6da1ff65fd46de90694e285a2b1ec0007f9de72348d496ad2a4b7240c33bbd962c7ab9e14ece9c223ed2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a6acda85f2afe42b3a0af09206af2c6c

    SHA1

    55c6664cf2695d4544d586e8dcc812d6cb25f157

    SHA256

    3a4e7e62457ef9f4dbf2781cdec59dff0f6debfe9511570815ae13e3c192f2ce

    SHA512

    79c9d531a310e02c846adf80a265d164eded4977682d9190376eb6fbc9a64408236f7189ddec8a706d6eb1e119218ac61ed473fccb62185f43b2599b8727b94f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb3213587f56fb2e363d0153147f5452

    SHA1

    bd5eaeaf788cee0a022afa7f950a0192b4fc3712

    SHA256

    0346d6de0452eca819a8e7c685d40e2d1466a98304ef7221252301c667159e91

    SHA512

    930bf04a90245330bdb2994fe98e2189f91f0524c12b843560976175c7251940d3bc8e62e4a3e1275c9db723a5c06b63be41454e65ba559446ad35e641a22dce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8aa7aeeda8ed591e4423ec7d55005dde

    SHA1

    5d6adf9c6c9c80642c43e33edf165423fed75069

    SHA256

    64c42a6592aeac6b8bf9b373e80cdd26eab292ca78cf9172ae1cc81d3201f9ad

    SHA512

    cf104e3664715a6b46315868a0ddb4369d97a42be072eb659391708cc245f485a5b1e9677c641ed110e2985d7ab5fb8fc75ba35a04e3dba367a603f901cfa247

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a6fad41bf2f06413f7a5e38c14a5ea79

    SHA1

    49810916f141eb52058edbe4fa2236ebd3916712

    SHA256

    b0593016c23ae73ae0209b6a21edab06da9875902089c05ae91c93389d1cf9ac

    SHA512

    49670a49e0caa96992d97372703fd915ac34e90d80874efc3a1d80057447491dc55139e7729b311ff1680caf2a445dca5b054087003a6cf07e205b3b4f79ed66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4f63b501fbfed9ed969c640df7857a1

    SHA1

    0a7ef1192a324e1be93c55d8c85eafe330379e43

    SHA256

    c8836e09985af6fa0d09ab2b9633ddb7ea0329af0fa127ae6a8711177b3801ba

    SHA512

    8064c4de39417694bbeb9b1f9c8b06fa8c5c141c335ad2c7702ce8a3850aa3bcf9b8303b4a8cfd187d38a1c3ca3834ca998c6964f241412903588785ca45ff5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    56afc9c8dc3a7fb1e6bc6ff940dfe4c2

    SHA1

    b5f6c27ea775f3b43323a30539de39f2b802b990

    SHA256

    e98afc5bf6f3a08cd35c19b0c2bb6588c3cf3cc7b57f1f023bbc2b95e14423eb

    SHA512

    54393374dc514a5d8db1be386bad07eef629c1201f6ab3678d43b294b73dbad14343d202244d374b48a8868f75c1c796e2602025e96ce0515fde94b66f13016d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4015dde35b96a2567d763e6854eb5f8

    SHA1

    df0436fdf01c2033e5e41fb2d69ee9664ed4a40e

    SHA256

    758036234f02319715480d95d7287357e471ac48b65a1b0ce1ed1476d1dc952d

    SHA512

    ae895c8dd3c48629a06bccb656d403253667c92a041a249cb68470ed94a6f7f7b0c897de4b38ff965df07648b4cd54bc02ef165613bfcca1a9f53ad69b644abe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c052559ae4bb54246edbbd7c76be849

    SHA1

    bba1c331b60fe448a5bb3e9b13fa0e98090a5c9f

    SHA256

    53308d8eef60870f1db7a5865c5d7bae7bfd5fed26bc8bf0cba58ec9979269d9

    SHA512

    2c4c5e0a6ec96a4d3272c8915789fa5ffe61099225f2f7e184f40eea749cc9d781ffeb9707c8e585de5508a948246a5430302f4c57534898d66c862bbf712476

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    313a44df4943cd5b4b48806b9c752512

    SHA1

    785936d1804856bd18ef06f7aa5c69086cf47120

    SHA256

    6bbf81ad47a385dcaba6d8995f72eecf61e2f879b14e30f4349c19a23d270021

    SHA512

    db1693137a6adff5acab525215cd67e049bdfa3ffd1e0ee630222c0359c672e3c0b8bb18becb5a8cb9f2d7ec137ef86bb50ce19be25851dd64a979df0c1e1e7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a5fecd69ec80b9e9cc0eaeaf160ef66e

    SHA1

    96bf7490cd3e5812764aec3ad3d032d2724a65d5

    SHA256

    d9f1a843a10b8523bc6e4dddf5c4c35ea074452380e2c28e2ffd1381fe9a9943

    SHA512

    41799cb03d0b783a424eed2c030c3a4ee2b7d9e14150267608286bfb939268823094a78b1cece1c1233c9bf7c14ef20b14a6626b1900519917f044cf9aff79e5

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\re26ad0\imagestore.dat

    Filesize

    24KB

    MD5

    67626eb7b708d1ef69c14caa0316e358

    SHA1

    0bb9256a1f3997337c51529fa22fb14a9b4cafa1

    SHA256

    c4ae7a5b29bc4cdca551bcacb9d7fbb0a80299caba7007e3f5bf18b405938d89

    SHA512

    910f313e16be02679351ccd49c37bab5c6c1ff8c5fa357895265b6d53fcd4e906bb07d073da1d690d64d11a14678756f90d967214838da9826c25947be7ce8b7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\favicon[1].ico

    Filesize

    23KB

    MD5

    ec2c34cadd4b5f4594415127380a85e6

    SHA1

    e7e129270da0153510ef04a148d08702b980b679

    SHA256

    128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7

    SHA512

    c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c

  • C:\Users\Admin\AppData\Local\Temp\Cab5F9F.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar60EC.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\VaultVM.Runtime.MSIL.1.0.0.0\NativePRo.dll

    Filesize

    40KB

    MD5

    94173de2e35aa8d621fc1c4f54b2a082

    SHA1

    fbb2266ee47f88462560f0370edb329554cd5869

    SHA256

    7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f

    SHA512

    cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798

  • \Users\Admin\AppData\Local\Temp\tmp19B8.tmp\0122a01d-b1e2-4a7c-ba4d-30de91110381.dll

    Filesize

    770KB

    MD5

    fcdce22248e6f6751dd6e67360f2abd8

    SHA1

    689711c1954bc5f50a73b092e31a68f4a19299b9

    SHA256

    d5e1bef0eb91637790223515625e2c0dd77bb4591d2e58d1f65cfe0c75577c65

    SHA512

    d4e8ac8f8900dfd3041747cc116773008191fcd754fb1eec8e4cffe343393250adc02d7c55ddf11f4fc4c649bd27f3004b0ed65484659130d5ebc60ff23cc5dd

  • memory/1968-360-0x0000000076FF0000-0x0000000077100000-memory.dmp

    Filesize

    1.1MB

  • memory/1968-361-0x00000000008C0000-0x0000000000900000-memory.dmp

    Filesize

    256KB

  • memory/1968-194-0x00000000008C0000-0x0000000000900000-memory.dmp

    Filesize

    256KB

  • memory/1968-13-0x0000000074640000-0x0000000074D2E000-memory.dmp

    Filesize

    6.9MB

  • memory/1968-12-0x00000000008C0000-0x0000000000900000-memory.dmp

    Filesize

    256KB

  • memory/1968-11-0x00000000007C0000-0x0000000000804000-memory.dmp

    Filesize

    272KB

  • memory/1968-10-0x0000000076FF0000-0x0000000077100000-memory.dmp

    Filesize

    1.1MB

  • memory/1968-0-0x0000000000AF0000-0x0000000000CC4000-memory.dmp

    Filesize

    1.8MB

  • memory/1968-6-0x00000000008C0000-0x0000000000900000-memory.dmp

    Filesize

    256KB

  • memory/1968-5-0x0000000000200000-0x000000000020E000-memory.dmp

    Filesize

    56KB

  • memory/1968-1-0x0000000074640000-0x0000000074D2E000-memory.dmp

    Filesize

    6.9MB