Analysis
-
max time kernel
129s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-de -
resource tags
arch:x64arch:x86image:win10v2004-20240419-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
06-05-2024 15:36
Behavioral task
behavioral1
Sample
Illegal_Services.exe
Resource
win7-20240221-de
Behavioral task
behavioral2
Sample
Illegal_Services.exe
Resource
win10v2004-20240419-de
General
-
Target
Illegal_Services.exe
-
Size
1.6MB
-
MD5
4a26c0872b72c9c1380bef1c2969c9c2
-
SHA1
a1937fee7f4503b0deb87c00aa4184802b073edc
-
SHA256
aced8dfcc6ca6b032fa8d2f0be09fcd32400083ff27a74e6cabaf4bd71c6d2b0
-
SHA512
ca6017f47f0260e5b60d9bcc0c6c934dc5749e00d041dec5bd5e3a1657537d13bbd5949d29e33c287b66c896f09aac178f7f1f05552d9303fc3b03a87c6386e4
-
SSDEEP
24576:Gi2Q9NXw2/wPOjdGxY2rqkqjVnlqud+/2P+A+ZecdyFoBkkAnexMrdgL7Z:BTq24GjdGSiqkqXfd+/9AqYanieKd
Malware Config
Extracted
stealerium
1
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Illegal_Services.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation Illegal_Services.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1456 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2928 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Illegal_Services.exepid process 212 Illegal_Services.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Illegal_Services.exetaskkill.exedescription pid process Token: SeDebugPrivilege 212 Illegal_Services.exe Token: SeDebugPrivilege 2928 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Illegal_Services.execmd.exedescription pid process target process PID 212 wrote to memory of 4960 212 Illegal_Services.exe cmd.exe PID 212 wrote to memory of 4960 212 Illegal_Services.exe cmd.exe PID 212 wrote to memory of 4960 212 Illegal_Services.exe cmd.exe PID 4960 wrote to memory of 2828 4960 cmd.exe chcp.com PID 4960 wrote to memory of 2828 4960 cmd.exe chcp.com PID 4960 wrote to memory of 2828 4960 cmd.exe chcp.com PID 4960 wrote to memory of 2928 4960 cmd.exe taskkill.exe PID 4960 wrote to memory of 2928 4960 cmd.exe taskkill.exe PID 4960 wrote to memory of 2928 4960 cmd.exe taskkill.exe PID 4960 wrote to memory of 1456 4960 cmd.exe timeout.exe PID 4960 wrote to memory of 1456 4960 cmd.exe timeout.exe PID 4960 wrote to memory of 1456 4960 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Illegal_Services.exe"C:\Users\Admin\AppData\Local\Temp\Illegal_Services.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp474A.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 2123⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak3⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp474A.tmp.batFilesize
56B
MD5afe80ec60e1cf0537508adffbf4e80d5
SHA17315fd721106992e4b7464ec566e4e1b811f9b02
SHA256eb79e9b45c7629f3c84ed0c9ec977c461ea91c538d70f3fd1ba36241a5e6fa5a
SHA5121be41b032ab264cb52b753beccf1fd2098786fc6d3dd4472c937ea6d560f2ddcf07a9ab3da3d0dae3da5f7604c1dadaac0ee44efb6c1a4a309dd33d1ac6ab4c5
-
memory/212-8-0x00000000056E0000-0x0000000005706000-memory.dmpFilesize
152KB
-
memory/212-2-0x0000000004F90000-0x0000000004FF6000-memory.dmpFilesize
408KB
-
memory/212-3-0x0000000074FF0000-0x00000000757A0000-memory.dmpFilesize
7.7MB
-
memory/212-6-0x00000000054B0000-0x00000000054CC000-memory.dmpFilesize
112KB
-
memory/212-7-0x0000000005650000-0x00000000056E2000-memory.dmpFilesize
584KB
-
memory/212-0-0x0000000074FFE000-0x0000000074FFF000-memory.dmpFilesize
4KB
-
memory/212-9-0x0000000005710000-0x0000000005718000-memory.dmpFilesize
32KB
-
memory/212-10-0x00000000065B0000-0x00000000065F2000-memory.dmpFilesize
264KB
-
memory/212-11-0x0000000006570000-0x000000000657A000-memory.dmpFilesize
40KB
-
memory/212-12-0x0000000006710000-0x0000000006814000-memory.dmpFilesize
1.0MB
-
memory/212-1-0x00000000004B0000-0x0000000000646000-memory.dmpFilesize
1.6MB
-
memory/212-17-0x0000000074FF0000-0x00000000757A0000-memory.dmpFilesize
7.7MB