Analysis

  • max time kernel
    54s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240221-de
  • resource tags

    arch:x64arch:x86image:win7-20240221-delocale:de-deos:windows7-x64systemwindows
  • submitted
    06-05-2024 15:36

General

  • Target

    Illegal_Services.exe

  • Size

    1.6MB

  • MD5

    4a26c0872b72c9c1380bef1c2969c9c2

  • SHA1

    a1937fee7f4503b0deb87c00aa4184802b073edc

  • SHA256

    aced8dfcc6ca6b032fa8d2f0be09fcd32400083ff27a74e6cabaf4bd71c6d2b0

  • SHA512

    ca6017f47f0260e5b60d9bcc0c6c934dc5749e00d041dec5bd5e3a1657537d13bbd5949d29e33c287b66c896f09aac178f7f1f05552d9303fc3b03a87c6386e4

  • SSDEEP

    24576:Gi2Q9NXw2/wPOjdGxY2rqkqjVnlqud+/2P+A+ZecdyFoBkkAnexMrdgL7Z:BTq24GjdGSiqkqXfd+/9AqYanieKd

Score
10/10

Malware Config

Extracted

Family

stealerium

C2

1

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Illegal_Services.exe
    "C:\Users\Admin\AppData\Local\Temp\Illegal_Services.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp462C.tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
          PID:2280
        • C:\Windows\SysWOW64\taskkill.exe
          TaskKill /F /IM 2300
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2684
        • C:\Windows\SysWOW64\timeout.exe
          Timeout /T 2 /Nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:2568
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Neues Textdokument.txt
      1⤵
        PID:2680

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Discovery

      System Information Discovery

      1
      T1082

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Temp\Tar45AF.tmp
        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Local\Temp\tmp462C.tmp.bat
        Filesize

        57B

        MD5

        86b7c9ba3e08900ebbbc838d49c134d5

        SHA1

        cf966b8b5043d3a1f2524ca250f4a614a26b933f

        SHA256

        cd45f1d3335977f01a12a5927a0f0f8fcfb65de4c5cc3d96a8846faa05bd1aae

        SHA512

        ab68ae491015a45c79ac4edf056f933b58073fe8b3fb38e2b7667287e86f09b549c35a289fcb2fdd4848431db3ab0ce7a74ab7b53ccedbbd571eabad17586dab

      • memory/2300-0-0x000000007499E000-0x000000007499F000-memory.dmp
        Filesize

        4KB

      • memory/2300-1-0x0000000000FB0000-0x0000000001146000-memory.dmp
        Filesize

        1.6MB

      • memory/2300-2-0x0000000074990000-0x000000007507E000-memory.dmp
        Filesize

        6.9MB

      • memory/2300-5-0x0000000000F00000-0x0000000000F92000-memory.dmp
        Filesize

        584KB

      • memory/2300-6-0x0000000000550000-0x0000000000576000-memory.dmp
        Filesize

        152KB

      • memory/2300-7-0x0000000000680000-0x0000000000688000-memory.dmp
        Filesize

        32KB

      • memory/2300-49-0x0000000074990000-0x000000007507E000-memory.dmp
        Filesize

        6.9MB