Analysis Overview
SHA256
1d0a104ed7ac079e1d15b29288eab5c9fdd6691817b37ed7fff8af14c378b9d4
Threat Level: Known bad
The file macspoof.exe was found to be: Known bad.
Malicious Activity Summary
Stealerium family
Stealerium
Checks computer location settings
Legitimate hosting services abused for malware hosting/C2
Unsigned PE
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-04 16:16
Signatures
Stealerium family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-04 16:16
Reported
2024-05-04 16:16
Platform
win10v2004-20240419-en
Max time kernel
32s
Max time network
33s
Command Line
Signatures
Stealerium
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\macspoof.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\timeout.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\macspoof.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\macspoof.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\macspoof.exe
"C:\Users\Admin\AppData\Local\Temp\macspoof.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp4FE5.tmp.bat
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\taskkill.exe
TaskKill /F /IM 1108
C:\Windows\SysWOW64\timeout.exe
Timeout /T 2 /Nobreak
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 0.204.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| NL | 23.62.61.146:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 146.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | discord.com | udp |
| US | 162.159.135.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | 232.135.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp | |
| N/A | 104.91.71.134:80 | tcp |
Files
memory/1108-0-0x000000007482E000-0x000000007482F000-memory.dmp
memory/1108-1-0x00000000006C0000-0x0000000000856000-memory.dmp
memory/1108-2-0x00000000051F0000-0x0000000005256000-memory.dmp
memory/1108-3-0x0000000074820000-0x0000000074FD0000-memory.dmp
memory/1108-6-0x0000000005860000-0x00000000058F2000-memory.dmp
memory/1108-7-0x00000000058F0000-0x0000000005916000-memory.dmp
memory/1108-8-0x0000000005930000-0x0000000005938000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp4FE5.tmp.bat
| MD5 | aba42da69ad4e45bc411147ccdb8816c |
| SHA1 | c2da03a6b24901c3b218e2c48ca44e9db5d6e9c0 |
| SHA256 | b4f7b26167283873fa1717d26a942d756584429712ef4bdeb1c246f1883bbb5c |
| SHA512 | ca0362c17871ffa7e512e8a7bf391d75e29a2794324c5d469152fdd0da3e2629540c5bd133dbce06725048df7f8c56c300c77567006e31db50f5a1838410a470 |
memory/1108-13-0x0000000074820000-0x0000000074FD0000-memory.dmp