Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 02:02
Behavioral task
behavioral1
Sample
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe
Resource
win10v2004-20240426-en
General
-
Target
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe
-
Size
1.6MB
-
MD5
1250f8db37edf8344bf2d4b85998b319
-
SHA1
3be39f97dafc08a07805529a7e7986afd9903cf1
-
SHA256
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b
-
SHA512
87cd2478e86d91b640b5265c98b1e7499378768e8c255679b57f34eb2f08525e8435d92b304011ed26a38799739f4eb355bf514b1982dc14dbd5900a0b4dc741
-
SSDEEP
49152:eLTq24GjdGSiqkqXfd+/9AqYanieKdQH:eiEjdGSiqkqXf0FLYW
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1236288178802135147/P2iZLzB_oNJFDenlHnHhz96DQUs2xxEf_VjLdUsuQkmmrMTuE9UJ6YfWkmHmfxN_m61i
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4848-1-0x0000000000B40000-0x0000000000CD2000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Detects executables manipulated with Fody 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4848-1-0x0000000000B40000-0x0000000000CD2000-memory.dmp INDICATOR_EXE_Packed_Fody -
Detects executables referencing Discord tokens regular expressions 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4848-1-0x0000000000B40000-0x0000000000CD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Discord_Regex -
Detects executables referencing credit card regular expressions 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4848-1-0x0000000000B40000-0x0000000000CD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_CC_Regex -
Detects executables referencing many VPN software clients. Observed in infosteslers 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4848-1-0x0000000000B40000-0x0000000000CD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_VPN -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4848-1-0x0000000000B40000-0x0000000000CD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4848-1-0x0000000000B40000-0x0000000000CD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
Detects executables with interest in wireless interface using netsh 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4848-1-0x0000000000B40000-0x0000000000CD2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4304 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1292 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exepid process 4848 b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exetaskkill.exedescription pid process Token: SeDebugPrivilege 4848 b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe Token: SeDebugPrivilege 1292 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.execmd.exedescription pid process target process PID 4848 wrote to memory of 3284 4848 b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe cmd.exe PID 4848 wrote to memory of 3284 4848 b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe cmd.exe PID 4848 wrote to memory of 3284 4848 b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe cmd.exe PID 3284 wrote to memory of 1136 3284 cmd.exe chcp.com PID 3284 wrote to memory of 1136 3284 cmd.exe chcp.com PID 3284 wrote to memory of 1136 3284 cmd.exe chcp.com PID 3284 wrote to memory of 1292 3284 cmd.exe taskkill.exe PID 3284 wrote to memory of 1292 3284 cmd.exe taskkill.exe PID 3284 wrote to memory of 1292 3284 cmd.exe taskkill.exe PID 3284 wrote to memory of 4304 3284 cmd.exe timeout.exe PID 3284 wrote to memory of 4304 3284 cmd.exe timeout.exe PID 3284 wrote to memory of 4304 3284 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe"C:\Users\Admin\AppData\Local\Temp\b5690971684484c0c1f3b29f428e631ac18af0b8bf636ea0230a1b7fd082418b.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp5D62.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 48483⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak3⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5D62.tmp.batFilesize
57B
MD50998d926b0b6feee262bc549214fe993
SHA1a4872067d9695a2137c9375def30e84bd2d7470d
SHA256842e3fc82905cc4f42416acd0c9cc2b5e593a8a719c4e822706f1abf5de3d6a0
SHA51223a81de0831dc796bced38281309cca46f64ed6eb92c38e0bec91e93c1f98fc69e844cacbbc1246b9e9f45b69ebedf09cff9220521fddd3942885b65994b3eea
-
memory/4848-0-0x00000000748DE000-0x00000000748DF000-memory.dmpFilesize
4KB
-
memory/4848-1-0x0000000000B40000-0x0000000000CD2000-memory.dmpFilesize
1.6MB
-
memory/4848-2-0x0000000005670000-0x00000000056D6000-memory.dmpFilesize
408KB
-
memory/4848-3-0x00000000748D0000-0x0000000075080000-memory.dmpFilesize
7.7MB
-
memory/4848-7-0x0000000005BF0000-0x0000000005C82000-memory.dmpFilesize
584KB
-
memory/4848-8-0x0000000005C80000-0x0000000005CA6000-memory.dmpFilesize
152KB
-
memory/4848-9-0x0000000005CB0000-0x0000000005CB8000-memory.dmpFilesize
32KB
-
memory/4848-14-0x00000000748D0000-0x0000000075080000-memory.dmpFilesize
7.7MB