Analysis
-
max time kernel
14s -
max time network
17s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-05-2024 15:30
Behavioral task
behavioral1
Sample
nllauncher.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
nllauncher.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
nllauncher.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
nllauncher.exe
Resource
win11-20240426-en
General
-
Target
nllauncher.exe
-
Size
1.6MB
-
MD5
8d19556ec36067d8cd6aca0181a60d6f
-
SHA1
d6b7827a278bde0072c6502137f3b48cd3c6fdd8
-
SHA256
27fc27dc8fd2f14c597932236924b9bd221cbdf62e751b06654566df17e20e80
-
SHA512
283ef56c211e43a850a7e08ea30da18f1aa5cec00636c48780d52cd1d350fe174b0ca9f3d6d9a92db72fe87b2822073703884aab999dc04821fbdf7c71369eea
-
SSDEEP
49152:EcTq24GjdGSiqkqXfd+/9AqYanieKdY9:E9EjdGSiqkqXf0FLYW
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1085818065360535573/7X1FOgIeWfvo7Wm1i-5gmDKJfqx3bk315y0D-XXNtRIcxGsl95D_Vbwjx7jAmP_WpkUA
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
nllauncher.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 nllauncher.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 nllauncher.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 nllauncher.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 icanhazip.com -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3660 584 WerFault.exe nllauncher.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
nllauncher.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 nllauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier nllauncher.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
nllauncher.exepid process 584 nllauncher.exe 584 nllauncher.exe 584 nllauncher.exe 584 nllauncher.exe 584 nllauncher.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
nllauncher.exemsiexec.exedescription pid process Token: SeDebugPrivilege 584 nllauncher.exe Token: SeSecurityPrivilege 4672 msiexec.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
nllauncher.execmd.execmd.exedescription pid process target process PID 584 wrote to memory of 2544 584 nllauncher.exe cmd.exe PID 584 wrote to memory of 2544 584 nllauncher.exe cmd.exe PID 584 wrote to memory of 2544 584 nllauncher.exe cmd.exe PID 2544 wrote to memory of 1636 2544 cmd.exe chcp.com PID 2544 wrote to memory of 1636 2544 cmd.exe chcp.com PID 2544 wrote to memory of 1636 2544 cmd.exe chcp.com PID 2544 wrote to memory of 4688 2544 cmd.exe netsh.exe PID 2544 wrote to memory of 4688 2544 cmd.exe netsh.exe PID 2544 wrote to memory of 4688 2544 cmd.exe netsh.exe PID 2544 wrote to memory of 4736 2544 cmd.exe findstr.exe PID 2544 wrote to memory of 4736 2544 cmd.exe findstr.exe PID 2544 wrote to memory of 4736 2544 cmd.exe findstr.exe PID 584 wrote to memory of 3384 584 nllauncher.exe cmd.exe PID 584 wrote to memory of 3384 584 nllauncher.exe cmd.exe PID 584 wrote to memory of 3384 584 nllauncher.exe cmd.exe PID 3384 wrote to memory of 3060 3384 cmd.exe chcp.com PID 3384 wrote to memory of 3060 3384 cmd.exe chcp.com PID 3384 wrote to memory of 3060 3384 cmd.exe chcp.com PID 3384 wrote to memory of 3420 3384 cmd.exe netsh.exe PID 3384 wrote to memory of 3420 3384 cmd.exe netsh.exe PID 3384 wrote to memory of 3420 3384 cmd.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
nllauncher.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 nllauncher.exe -
outlook_win_path 1 IoCs
Processes:
nllauncher.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 nllauncher.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\nllauncher.exe"C:\Users\Admin\AppData\Local\Temp\nllauncher.exe"1⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 28682⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 584 -ip 5841⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\e956dbf134d6a3785958acaeeb19db8a\Admin@GNMGPFVO_en-US\Browsers\Firefox\Bookmarks.txtFilesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
memory/584-9-0x00000000057B0000-0x00000000057B8000-memory.dmpFilesize
32KB
-
memory/584-2-0x00000000051B0000-0x0000000005216000-memory.dmpFilesize
408KB
-
memory/584-3-0x0000000074890000-0x0000000075041000-memory.dmpFilesize
7.7MB
-
memory/584-7-0x00000000056F0000-0x0000000005782000-memory.dmpFilesize
584KB
-
memory/584-8-0x0000000005780000-0x00000000057A6000-memory.dmpFilesize
152KB
-
memory/584-0-0x000000007489E000-0x000000007489F000-memory.dmpFilesize
4KB
-
memory/584-10-0x00000000066D0000-0x00000000066DA000-memory.dmpFilesize
40KB
-
memory/584-11-0x00000000066E0000-0x00000000066E8000-memory.dmpFilesize
32KB
-
memory/584-12-0x0000000006700000-0x000000000671E000-memory.dmpFilesize
120KB
-
memory/584-1-0x0000000000560000-0x00000000006F4000-memory.dmpFilesize
1.6MB
-
memory/584-69-0x00000000068E0000-0x0000000006972000-memory.dmpFilesize
584KB
-
memory/584-74-0x0000000007630000-0x0000000007BD6000-memory.dmpFilesize
5.6MB
-
memory/584-83-0x0000000074890000-0x0000000075041000-memory.dmpFilesize
7.7MB