Analysis

  • max time kernel
    29s
  • max time network
    27s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 15:30

General

  • Target

    nllauncher.exe

  • Size

    1.6MB

  • MD5

    8d19556ec36067d8cd6aca0181a60d6f

  • SHA1

    d6b7827a278bde0072c6502137f3b48cd3c6fdd8

  • SHA256

    27fc27dc8fd2f14c597932236924b9bd221cbdf62e751b06654566df17e20e80

  • SHA512

    283ef56c211e43a850a7e08ea30da18f1aa5cec00636c48780d52cd1d350fe174b0ca9f3d6d9a92db72fe87b2822073703884aab999dc04821fbdf7c71369eea

  • SSDEEP

    49152:EcTq24GjdGSiqkqXfd+/9AqYanieKdY9:E9EjdGSiqkqXf0FLYW

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1085818065360535573/7X1FOgIeWfvo7Wm1i-5gmDKJfqx3bk315y0D-XXNtRIcxGsl95D_Vbwjx7jAmP_WpkUA

Signatures

  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\nllauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\nllauncher.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:2712
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
          PID:1288
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          3⤵
            PID:2088
          • C:\Windows\SysWOW64\findstr.exe
            findstr All
            3⤵
              PID:2232
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2392
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              3⤵
                PID:336
              • C:\Windows\SysWOW64\netsh.exe
                netsh wlan show networks mode=bssid
                3⤵
                  PID:836
            • C:\Windows\system32\msiexec.exe
              C:\Windows\system32\msiexec.exe /V
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3048

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Defense Evasion

            Subvert Trust Controls

            1
            T1553

            Install Root Certificate

            1
            T1553.004

            Modify Registry

            1
            T1112

            Credential Access

            Unsecured Credentials

            1
            T1552

            Credentials In Files

            1
            T1552.001

            Discovery

            Query Registry

            1
            T1012

            System Information Discovery

            1
            T1082

            Collection

            Data from Local System

            1
            T1005

            Email Collection

            1
            T1114

            Command and Control

            Web Service

            1
            T1102

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
              Filesize

              68KB

              MD5

              29f65ba8e88c063813cc50a4ea544e93

              SHA1

              05a7040d5c127e68c25d81cc51271ffb8bef3568

              SHA256

              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

              SHA512

              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

            • C:\Users\Admin\AppData\Local\Temp\Tar3F29.tmp
              Filesize

              177KB

              MD5

              435a9ac180383f9fa094131b173a2f7b

              SHA1

              76944ea657a9db94f9a4bef38f88c46ed4166983

              SHA256

              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

              SHA512

              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

            • C:\Users\Admin\AppData\Local\eaaf0daced4111a6f80a20ddcc925e21\Admin@QGTQZTRE_en-US\Browsers\Firefox\Bookmarks.txt
              Filesize

              105B

              MD5

              2e9d094dda5cdc3ce6519f75943a4ff4

              SHA1

              5d989b4ac8b699781681fe75ed9ef98191a5096c

              SHA256

              c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

              SHA512

              d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

            • C:\Users\Admin\AppData\Local\eaaf0daced4111a6f80a20ddcc925e21\Admin@QGTQZTRE_en-US\Directories\Startup.txt
              Filesize

              24B

              MD5

              68c93da4981d591704cea7b71cebfb97

              SHA1

              fd0f8d97463cd33892cc828b4ad04e03fc014fa6

              SHA256

              889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483

              SHA512

              63455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402

            • C:\Users\Admin\AppData\Local\eaaf0daced4111a6f80a20ddcc925e21\Admin@QGTQZTRE_en-US\Directories\Videos.txt
              Filesize

              23B

              MD5

              1fddbf1169b6c75898b86e7e24bc7c1f

              SHA1

              d2091060cb5191ff70eb99c0088c182e80c20f8c

              SHA256

              a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733

              SHA512

              20bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d

            • C:\Users\Admin\AppData\Local\eaaf0daced4111a6f80a20ddcc925e21\Admin@QGTQZTRE_en-US\System\Apps.txt
              Filesize

              6KB

              MD5

              0f9581027b4415e874ad3fc16f03bc4c

              SHA1

              d86c7ca2859e57658a3eecee243945f53de10e35

              SHA256

              908f95b2e43ef6b6dff13d4bfd320ed111196a2a58a2528aa3b841ac870a0dca

              SHA512

              41546610486856163dcf00d8a3929dfa8286ef41ada6fa38fc944b274865137fd8c4850bfd4fcd978bd6d604e31748431fe7c93e7d33d148c17853ad8a93460a

            • C:\Users\Admin\AppData\Local\eaaf0daced4111a6f80a20ddcc925e21\Admin@QGTQZTRE_en-US\System\Debug.txt
              Filesize

              1KB

              MD5

              7af8bfd2e6cb925d6005abee3df2a2af

              SHA1

              76c13b07635debc36e313e7860e546e74427b878

              SHA256

              86b8e724ffa0301f973a59a05ba5eb1e3c8bc9a739c52187b75670706cce1793

              SHA512

              05fa36365b6e7d44009e13e95a795440e5957f2304aca22f7ec6dfb325f968c46a39c4a6afdf011ddfd91f6882cab4071e90a1b56573dc7d023756d39d6b9d78

            • C:\Users\Admin\AppData\Local\eaaf0daced4111a6f80a20ddcc925e21\Admin@QGTQZTRE_en-US\System\ProductKey.txt
              Filesize

              29B

              MD5

              cad6c6bee6c11c88f5e2f69f0be6deb7

              SHA1

              289d74c3bebe6cca4e1d2e084482ad6d21316c84

              SHA256

              dc288491fadc4a85e71085890e3d6a7746e99a317cd5ef09a30272dfb10398c0

              SHA512

              e02cf6bff8b4ebd7a1346ecb1667be36c3ef7415fff77c3b9cfb370f3d0dc861f74d3e0e49065699850ba6cc025cd68d14ceb73f3b512c2a9b28873a69aff097

            • C:\Users\Admin\AppData\Local\eaaf0daced4111a6f80a20ddcc925e21\msgid.dat
              Filesize

              19B

              MD5

              484d6458955da5762924db1f6d3484a5

              SHA1

              de2898d9b2e3a92b70f8caeb25625ed14fc7e9c5

              SHA256

              621b5f8bb601f2a14f582f8267d0b767553d0424e8b9d683bbe997095a05a6b4

              SHA512

              15f68a548ec55275bf59aa0144ddfbb57ac1bc3dcad21aff25e045ca1e2cc38b7b1ff85a9ada029ce3a16b13c6d23f680a5d9748b88d8f9decdc0a76d7c89890

            • memory/2712-8-0x0000000000A40000-0x0000000000A48000-memory.dmp
              Filesize

              32KB

            • memory/2712-48-0x0000000000DE0000-0x0000000000DFE000-memory.dmp
              Filesize

              120KB

            • memory/2712-47-0x0000000000D90000-0x0000000000D98000-memory.dmp
              Filesize

              32KB

            • memory/2712-46-0x0000000000D80000-0x0000000000D8A000-memory.dmp
              Filesize

              40KB

            • memory/2712-166-0x0000000005DE0000-0x0000000005E5A000-memory.dmp
              Filesize

              488KB

            • memory/2712-0-0x00000000749DE000-0x00000000749DF000-memory.dmp
              Filesize

              4KB

            • memory/2712-7-0x0000000000AF0000-0x0000000000B16000-memory.dmp
              Filesize

              152KB

            • memory/2712-6-0x0000000005080000-0x0000000005112000-memory.dmp
              Filesize

              584KB

            • memory/2712-2-0x00000000749D0000-0x00000000750BE000-memory.dmp
              Filesize

              6.9MB

            • memory/2712-230-0x0000000007410000-0x00000000074C2000-memory.dmp
              Filesize

              712KB

            • memory/2712-233-0x00000000749DE000-0x00000000749DF000-memory.dmp
              Filesize

              4KB

            • memory/2712-234-0x00000000749D0000-0x00000000750BE000-memory.dmp
              Filesize

              6.9MB

            • memory/2712-1-0x0000000000130000-0x00000000002C4000-memory.dmp
              Filesize

              1.6MB