Analysis
-
max time kernel
6s -
max time network
20s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08-05-2024 15:30
Behavioral task
behavioral1
Sample
nllauncher.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
nllauncher.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
nllauncher.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
nllauncher.exe
Resource
win11-20240426-en
General
-
Target
nllauncher.exe
-
Size
1.6MB
-
MD5
8d19556ec36067d8cd6aca0181a60d6f
-
SHA1
d6b7827a278bde0072c6502137f3b48cd3c6fdd8
-
SHA256
27fc27dc8fd2f14c597932236924b9bd221cbdf62e751b06654566df17e20e80
-
SHA512
283ef56c211e43a850a7e08ea30da18f1aa5cec00636c48780d52cd1d350fe174b0ca9f3d6d9a92db72fe87b2822073703884aab999dc04821fbdf7c71369eea
-
SSDEEP
49152:EcTq24GjdGSiqkqXfd+/9AqYanieKdY9:E9EjdGSiqkqXf0FLYW
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1085818065360535573/7X1FOgIeWfvo7Wm1i-5gmDKJfqx3bk315y0D-XXNtRIcxGsl95D_Vbwjx7jAmP_WpkUA
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 icanhazip.com -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2800 1900 WerFault.exe nllauncher.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
nllauncher.exepid process 1900 nllauncher.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nllauncher.exedescription pid process Token: SeDebugPrivilege 1900 nllauncher.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\nllauncher.exe"C:\Users\Admin\AppData\Local\Temp\nllauncher.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 34722⤵
- Program crash
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\25ed305738298a4c9bc0e97ebfd8da5a\Admin@NDTNZVHN_en-US\Browsers\Firefox\Bookmarks.txtFilesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\Temp\Stealerium-Latest.logFilesize
1003B
MD54cb421c962dde758df969079a1f02068
SHA18ede40e3cf5c8274218ee9096aee5926d64fea14
SHA256f65fbe553c5802e795a3ac4e2b03583b021ef04c9355e94653186fd0d0890530
SHA5123aa50066736574e5d1b8a49c6f6cd46d484d8369f35ff1ac4256af28b8fed97a52ab37e693fca349e6f69a3f39fa6316707eac782d15f4c258d83acd2b02fec3
-
memory/1900-9-0x00000000054E0000-0x00000000054E8000-memory.dmpFilesize
32KB
-
memory/1900-11-0x00000000062B0000-0x00000000062B8000-memory.dmpFilesize
32KB
-
memory/1900-0-0x000000007376E000-0x000000007376F000-memory.dmpFilesize
4KB
-
memory/1900-8-0x00000000054B0000-0x00000000054D6000-memory.dmpFilesize
152KB
-
memory/1900-7-0x0000000005320000-0x00000000053B2000-memory.dmpFilesize
584KB
-
memory/1900-10-0x00000000062A0000-0x00000000062AA000-memory.dmpFilesize
40KB
-
memory/1900-12-0x00000000062D0000-0x00000000062EE000-memory.dmpFilesize
120KB
-
memory/1900-3-0x0000000073760000-0x0000000073E4E000-memory.dmpFilesize
6.9MB
-
memory/1900-2-0x0000000004DC0000-0x0000000004E26000-memory.dmpFilesize
408KB
-
memory/1900-52-0x00000000069E0000-0x0000000006A72000-memory.dmpFilesize
584KB
-
memory/1900-1-0x0000000000400000-0x0000000000594000-memory.dmpFilesize
1.6MB
-
memory/1900-57-0x00000000072E0000-0x00000000077DE000-memory.dmpFilesize
5.0MB
-
memory/1900-92-0x000000007376E000-0x000000007376F000-memory.dmpFilesize
4KB
-
memory/1900-93-0x0000000073760000-0x0000000073E4E000-memory.dmpFilesize
6.9MB