Analysis
-
max time kernel
79s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20240404-uk -
resource tags
arch:x64arch:x86image:win10-20240404-uklocale:uk-uaos:windows10-1703-x64systemwindows -
submitted
06-05-2024 15:44
Behavioral task
behavioral1
Sample
Illegal_Services.exe
Resource
win10-20240404-uk
General
-
Target
Illegal_Services.exe
-
Size
1.6MB
-
MD5
4a26c0872b72c9c1380bef1c2969c9c2
-
SHA1
a1937fee7f4503b0deb87c00aa4184802b073edc
-
SHA256
aced8dfcc6ca6b032fa8d2f0be09fcd32400083ff27a74e6cabaf4bd71c6d2b0
-
SHA512
ca6017f47f0260e5b60d9bcc0c6c934dc5749e00d041dec5bd5e3a1657537d13bbd5949d29e33c287b66c896f09aac178f7f1f05552d9303fc3b03a87c6386e4
-
SSDEEP
24576:Gi2Q9NXw2/wPOjdGxY2rqkqjVnlqud+/2P+A+ZecdyFoBkkAnexMrdgL7Z:BTq24GjdGSiqkqXfd+/9AqYanieKd
Malware Config
Extracted
stealerium
1
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4616 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 324 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Illegal_Services.exepid process 524 Illegal_Services.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Illegal_Services.exetaskkill.exedescription pid process Token: SeDebugPrivilege 524 Illegal_Services.exe Token: SeDebugPrivilege 324 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Illegal_Services.execmd.exedescription pid process target process PID 524 wrote to memory of 2660 524 Illegal_Services.exe cmd.exe PID 524 wrote to memory of 2660 524 Illegal_Services.exe cmd.exe PID 524 wrote to memory of 2660 524 Illegal_Services.exe cmd.exe PID 2660 wrote to memory of 2528 2660 cmd.exe chcp.com PID 2660 wrote to memory of 2528 2660 cmd.exe chcp.com PID 2660 wrote to memory of 2528 2660 cmd.exe chcp.com PID 2660 wrote to memory of 324 2660 cmd.exe taskkill.exe PID 2660 wrote to memory of 324 2660 cmd.exe taskkill.exe PID 2660 wrote to memory of 324 2660 cmd.exe taskkill.exe PID 2660 wrote to memory of 4616 2660 cmd.exe timeout.exe PID 2660 wrote to memory of 4616 2660 cmd.exe timeout.exe PID 2660 wrote to memory of 4616 2660 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Illegal_Services.exe"C:\Users\Admin\AppData\Local\Temp\Illegal_Services.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp82CC.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 5243⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak3⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp82CC.tmp.batFilesize
56B
MD53d2ccd76bf009ea94b6def8062f3e71d
SHA150a9455a61b0416d9f7efb64af59f90e708939dd
SHA256c507fbfaedcff35f135530a12b9643df58cbeed69cd1e25a240c539e835121a5
SHA512453f00e19246a200984f98483066951daf7e897b828eeed9042073ed70cc714e385d1a1797d1789102913173e6a3744ecedc042cd13d1154c17ec4358b3799a8
-
memory/524-0-0x00000000735EE000-0x00000000735EF000-memory.dmpFilesize
4KB
-
memory/524-1-0x00000000004E0000-0x0000000000676000-memory.dmpFilesize
1.6MB
-
memory/524-2-0x0000000004F10000-0x0000000004F76000-memory.dmpFilesize
408KB
-
memory/524-3-0x00000000735E0000-0x0000000073CCE000-memory.dmpFilesize
6.9MB
-
memory/524-6-0x0000000005500000-0x0000000005592000-memory.dmpFilesize
584KB
-
memory/524-7-0x0000000005590000-0x00000000055B6000-memory.dmpFilesize
152KB
-
memory/524-8-0x00000000055D0000-0x00000000055D8000-memory.dmpFilesize
32KB
-
memory/524-13-0x00000000735E0000-0x0000000073CCE000-memory.dmpFilesize
6.9MB