Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 02:02
Behavioral task
behavioral1
Sample
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe
Resource
win10v2004-20240426-en
General
-
Target
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe
-
Size
1.6MB
-
MD5
1250f8db37edf8344bf2d4b85998b319
-
SHA1
3be39f97dafc08a07805529a7e7986afd9903cf1
-
SHA256
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b
-
SHA512
87cd2478e86d91b640b5265c98b1e7499378768e8c255679b57f34eb2f08525e8435d92b304011ed26a38799739f4eb355bf514b1982dc14dbd5900a0b4dc741
-
SSDEEP
49152:eLTq24GjdGSiqkqXfd+/9AqYanieKdQH:eiEjdGSiqkqXf0FLYW
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1236288178802135147/P2iZLzB_oNJFDenlHnHhz96DQUs2xxEf_VjLdUsuQkmmrMTuE9UJ6YfWkmHmfxN_m61i
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-1-0x0000000000070000-0x0000000000202000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Detects executables manipulated with Fody 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-1-0x0000000000070000-0x0000000000202000-memory.dmp INDICATOR_EXE_Packed_Fody -
Detects executables referencing Discord tokens regular expressions 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-1-0x0000000000070000-0x0000000000202000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Discord_Regex -
Detects executables referencing credit card regular expressions 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-1-0x0000000000070000-0x0000000000202000-memory.dmp INDICATOR_SUSPICIOUS_EXE_CC_Regex -
Detects executables referencing many VPN software clients. Observed in infosteslers 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-1-0x0000000000070000-0x0000000000202000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_VPN -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-1-0x0000000000070000-0x0000000000202000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-1-0x0000000000070000-0x0000000000202000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
Detects executables with interest in wireless interface using netsh 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-1-0x0000000000070000-0x0000000000202000-memory.dmp INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2808 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2764 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exepid process 2360 b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2360 b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe Token: SeDebugPrivilege 2764 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.execmd.exedescription pid process target process PID 2360 wrote to memory of 1960 2360 b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe cmd.exe PID 2360 wrote to memory of 1960 2360 b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe cmd.exe PID 2360 wrote to memory of 1960 2360 b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe cmd.exe PID 2360 wrote to memory of 1960 2360 b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe cmd.exe PID 1960 wrote to memory of 2784 1960 cmd.exe chcp.com PID 1960 wrote to memory of 2784 1960 cmd.exe chcp.com PID 1960 wrote to memory of 2784 1960 cmd.exe chcp.com PID 1960 wrote to memory of 2784 1960 cmd.exe chcp.com PID 1960 wrote to memory of 2764 1960 cmd.exe taskkill.exe PID 1960 wrote to memory of 2764 1960 cmd.exe taskkill.exe PID 1960 wrote to memory of 2764 1960 cmd.exe taskkill.exe PID 1960 wrote to memory of 2764 1960 cmd.exe taskkill.exe PID 1960 wrote to memory of 2808 1960 cmd.exe timeout.exe PID 1960 wrote to memory of 2808 1960 cmd.exe timeout.exe PID 1960 wrote to memory of 2808 1960 cmd.exe timeout.exe PID 1960 wrote to memory of 2808 1960 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe"C:\Users\Admin\AppData\Local\Temp\b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp4043.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 23603⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak3⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar3FE5.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\AppData\Local\Temp\tmp4043.tmp.batFilesize
57B
MD54223a1770a8fd1376f49e36b9ec70517
SHA1e0964fa7ff5d9a361e54f95c286659214d752e31
SHA256b2d07f7e84217a13983723468efa974d15640b4936c501b95d367516c8fa0e5f
SHA51285adf38e6b77dee40cc332c7ba8eaa3c01ba498d17c2a86b6ed39e4f70bf32c16e88b32027fc90257222521e9d3bc8b94bcd500c1079c62c37d2652eb35d0f41
-
memory/2360-0-0x000000007455E000-0x000000007455F000-memory.dmpFilesize
4KB
-
memory/2360-1-0x0000000000070000-0x0000000000202000-memory.dmpFilesize
1.6MB
-
memory/2360-2-0x0000000074550000-0x0000000074C3E000-memory.dmpFilesize
6.9MB
-
memory/2360-6-0x0000000002160000-0x00000000021F2000-memory.dmpFilesize
584KB
-
memory/2360-7-0x0000000002030000-0x0000000002056000-memory.dmpFilesize
152KB
-
memory/2360-8-0x0000000000820000-0x0000000000828000-memory.dmpFilesize
32KB
-
memory/2360-50-0x0000000074550000-0x0000000074C3E000-memory.dmpFilesize
6.9MB